Financial identity management challenges

Access & Identity Management Handbook 2022 Access Control & Identity Management

An American multinational financial services corporation that facilitates electronic funds transfers throughout the world, has about

13 000 identities (employee and non-employee) across 80 office locations in 40 countries. The company was managing these identities using multiple locally maintained access control systems.

When the use of these multiple disparate access control systems and devices became increasingly complicated, the HID client resorted to manual processes to automate access provisioning. Not only were their processes inefficient, but they also increased their risk exposure. A change was necessary to improve their situation, so they began their search for a new solution to manage their physical security infrastructure. The challenges and limitations faced by the company were leveraged to identify key requirements needed to manage their physical identities and access, which included the following.

Interoperability of authoritative and security systems

The security team lacked a consolidated view into the physical security infrastructure of the organisation, resulting from a lack of standardised global policies, reporting, planning processes, common documentation and tools to protect people, information and the facility in offices across their many global locations. A centralised, interoperable system would be required to manage the scope of their identities and physical access requirements.

Common system architecture and design

The complication described above was aggravated due to the employment of several identity-based systems, each containing multiple stakeholders. These systems store data for the same person but – due to lack of proper integration – data exchange happens through manual interactions. These solutions also had limited or no integration with authoritative and logical security systems. As a result, there were huge operational inefficiencies, delays and a high state of risk to potential security exceptions. To blunt these risks, future-focused integration capabilities would be required.

Managing access lifecycles for multiple stakeholders

The company has multiple stakeholders (employees, visitors, contractors) who access the premises and each person holds a varying risk profile and access requirement. Due to the manual nature of its access control operation, the entire process of onboarding, performing background checks, provisioning access and off-boarding was slow, error-ridden and costly. Automation would be necessary to improve operating costs and increase efficiency.

Common notification and escalation procedures

The client’s approval lifecycle was manual and paper-based; therefore, it was extremely difficult to track access-related activities. For instance, if an approver was not available, the identity had to wait multiple days to get access. To solve this problem, they would need standardised criteria for escalation, activation and communications.

Compliance with industry standards and regulations

The client’s physical security systems managed identity, credential and access data but lacked the capability to automate the policies and processes for managing personal and property security. This required extensive manual intervention by the physical security team which caused delays and manual errors as well as a high level of effort from the team. The company was looking for a 100% automated environment for reporting and assurance in accordance with government/industry compliance standards.

The HID solution

The challenges mentioned above are exactly the issues that HID’s SAFE solution solves best. The client selected the HID SAFE Enterprise solution to provide their organisation with a comprehensive view of their physical access operations and automate their existing processes associated with access and identity lifecycle management, resulting in faster processing times and better audit controls.

Integration and interoperability of the siloed physical security system

HID’s SAFE Enterprise solution provides ready-to-use connectors (agents) which integrate with the external disparate Physical Access Control Systems (PACS) present at the client’s sites (CCURE and Picture Perfect) and the authoritative Human Resource Management System (HRMS) to provide a common centralised security platform. With the ability to communicate across devices and systems, HID SAFE delivers the client a unified comprehensive view of security and provides seamless processing of identity information from the PACS to HID SAFE.

Automation of the entire physical identity lifecycle management

HID SAFE Enterprise enabled the client’s security managers to create and automate standard security processes and policies to grant, manage, revoke and provision physical security identities and access privileges across international sites/PACS.

Tracking every visitor with HID SAFE Visitor Manager

HID SAFE Visitor Manager provided the client with web-based, policy-driven software to securely manage visitors by automating different processes throughout the access lifecycle. HID SAFE Visitor Manager manages the visitor pre-registration, background checks, check-ins, badging and check-outs. It provides an efficient visitor management process and the ability to track and report every visitor’s activity.

HID’s SAFE solution has replaced the company’s manual processes associated with automated on-/off-boarding employees, visitors and contractors, card issuance, access assignments and provisioning access control, so new personnel can be operational in minutes. SAFE’s improvement in efficiency ensures a 90% reduction in the card management process and abandons manual processes for identity-management – saving the client a huge sum in annual operation costs.

To summarise, the overall benefits for the financial services client using SAFE Software from HID are:

Safer premises: SAFE provides a centralised administration of the entire access management process. The security team now has a comprehensive unified view of their entire physical operation. This ensures that unwanted identities are not able to access premises.

Enhanced operational efficiencies: With SAFE providing system interoperability and automation of the otherwise manual tasks, the physical access processes such as access approvals are completed within minutes, without delay – improving operational efficiencies.

Substantial reduction in operation costs: SAFE reduced manual interventions such as paper-based request forms and it automated reports so that security and business units can analyse data quickly and in turn, make informed business decisions. This has increased efficiency and significantly lowered processing time Auditing and compliance: SAFE delivered a 100% automated environment for reporting and assurance in accordance with government/industry compliance standards.

Comprehensive reporting: SAFE provides security managers with robust and full-featured reporting capabilities that can support workflow – embedded, scheduled and ad hoc reporting of identity and physical access events and activities. Configurable reports and dashboards promote efficient and appropriate operational decisions to better manage threats. Reports may also be sent to SAFE users based on events/triggers or on defined scheduling as delegated in the policy engine.

Reprinted with the permission of HID Global.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...