{"id":248701,"date":"2024-08-22T07:43:24","date_gmt":"2024-08-22T06:43:24","guid":{"rendered":"https:\/\/mactwin.com\/access-management-in-2018\/"},"modified":"2025-10-30T13:46:58","modified_gmt":"2025-10-30T12:46:58","slug":"access-management-in-2018","status":"publish","type":"post","link":"https:\/\/mactwin.com\/en\/access-management-in-2018\/","title":{"rendered":"Access management in 2018"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><h2>Access management in 2018<\/h2>\n<p><strong>One of the important trends in security is that security systems are increasingly being managed integrally.<br \/>\nThis applies to access management, but also to camera security or building automation.<br \/>\nThis is not only practical, it also offers extra options that make access management in 2018 a lot smarter and more user-friendly. <\/strong> For a long time, security systems were used side by side and that was the most normal thing in the world.<br \/>\nIn the meantime, due to the increased integration possibilities, it has become increasingly easy to combine functionalities of subsystems.<br \/>\nThe advantage of this is not only that the level of security is higher, but also the ease of use increases.<br \/>\nBy combining access control systems with external systems, they become smarter and we as humans have to perform fewer actions.<br \/>\nThe security system is less &#8216;present&#8217;.<br \/>\nA modern security system does not adversely affect hospitality and has an &#8216;open&#8217; appearance.<br \/>\nTo give you an idea of what that looks like in practice, here are three practical examples.<\/p>\n<h3>1. Using biometrics<\/h3>\n<p>Adding <a href=\"https:\/\/mactwin.com\/en\/?page_id=25807\" target=\"_blank\" rel=\"noopener noreferrer\">biometric identification systems<\/a> to access control increases the level of security.<br \/>\nMoreover, there is no longer a need for a separate means of identification, such as the iris scanners at Schiphol or the palm readers at the gate of a logistics company.<br \/>\nAt the same time, the use of biometrics can speed up the identification process, such as at Schiphol.<br \/>\nAnother form of biometrics is facial recognition. <a href=\"https:\/\/mactwin.com\/security-oplossingen\/camerabeveiliging\/video-management-software\/\" target=\"_blank\" rel=\"noopener noreferrer\">Video Management Systems (VMS)<\/a> are already often linked to access control.<br \/>\nExamples include switching on a camera or recording images when someone presents an invalid access card and retrieving images based on events in the access control system.<br \/>\nThe algorithms for facial recognition are becoming more and more powerful and can be used with almost any (IP) camera.<br \/>\nFor example, it is already possible to recognize a person from a few meters away with a common IP camera.<br \/>\nSuch an integration creates &#8216;unnoticed access management&#8217;.<br \/>\nAfter facial recognition, the VMS instructs the access control system to open a door.<br \/>\nOf course, measures must be taken to ensure privacy and it must be clearly defined what the data is used for and how it is secured.<br \/>\nAfter all, personal data is processed.<\/p>\n<h3>2. Reception on the company premises<\/h3>\n<p>How nice is it that when you arrive at a parking lot or garage, you are automatically guided to a free spot.<br \/>\nIn the meantime, the host or hostess will receive a notification that his or her visitors have arrived.<br \/>\nIsn&#8217;t that a lot friendlier than the visitor having to hang out of his car window for the intercom?<br \/>\nThis form of access management, in which special license plate cameras and possibly external facility or HRM packages are combined with access management, is not only hospitable but also efficient and safe.<br \/>\nIf something is not right, it is immediately identified and human intervention can take place if necessary.<br \/>\nHowever, the visitor&#8217;s details, such as their license plate, must be entered somewhere in advance.<br \/>\nAnd in this example, too, personal data is processed and measures must therefore be taken to protect it.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-top:30px;--awb-margin-bottom:20px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.linkedin.com\/company\/mactwin-security\/\" target=\"_self\" aria-label=\"MinibannervolgopLinkedin\"><img decoding=\"async\" width=\"800\" height=\"105\" alt=\"Volg ons op Linkedin\" src=\"https:\/\/mactwin.com\/wp-content\/uploads\/2020\/06\/MinibannervolgopLinkedin.jpg\" class=\"img-responsive wp-image-15560 no-lazyload\" srcset=\"https:\/\/mactwin.com\/wp-content\/uploads\/2020\/06\/MinibannervolgopLinkedin-200x26.jpg 200w, https:\/\/mactwin.com\/wp-content\/uploads\/2020\/06\/MinibannervolgopLinkedin-400x53.jpg 400w, https:\/\/mactwin.com\/wp-content\/uploads\/2020\/06\/MinibannervolgopLinkedin-600x79.jpg 600w, https:\/\/mactwin.com\/wp-content\/uploads\/2020\/06\/MinibannervolgopLinkedin.jpg 800w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/span><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div>\n<div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-2\"><h3>3. Mobile Access<\/h3>\n<p>We used to use keys and the administrator was given a master key.<br \/>\nAfter that, access passes, with or without PIN codes, were introduced.<br \/>\nThis was a huge step forward because it also allowed access to be divided into time slots.<br \/>\nAfter all, a code card can be given a certain validity.<br \/>\nAn additional advantage of this step forward is the possibility to make reports afterwards.<br \/>\nRecently, we have been able to add another new identifier to this list: the smartphone.<br \/>\nThe use of a smartphone as a means of identification, or Mobile Access, is based on a cloud service that is linked to the access management system.<br \/>\nMobile Access goes beyond just using the device&#8217;s NFC transmitter and disclosing the code in the access control system.<br \/>\nThe strength lies in the link (integration) of the access management system with a cloud-based issuance of &#8216;virtual credentials&#8217;.<br \/>\nFrom the access control system, a (virtual) means of access can be sent to someone that can be used to gain access.<br \/>\nThis can also be a temporary visitor&#8217;s pass.<br \/>\nMobile Access has the following advantages:<\/p>\n<ul>\n<li>It is no longer necessary to receive a pass first.<\/li>\n<li>The ease of use is great due to the longer reading distance.<br \/>\nAt a distance of a few meters, it is now possible to open a door (hands-free).<br \/>\nThis saves an action.<\/li>\n<li>It saves a plastic card and therefore has less impact on the environment.<\/li>\n<\/ul>\n<h3>Open if possible, closed if necessary<\/h3>\n<p>Modern security focuses on hospitality and security measures are invisible as much as possible.<br \/>\nBy carefully dividing spaces (zones) into risk classes, public and semi-public areas can be closed off from the secure areas, without everyone having to be guided through access gates.<br \/>\nThis can be done, for example, using the <a href=\"https:\/\/mactwin.com\/over-ons\/beveiligen-vanuit-visie\/octagon\/\" target=\"_blank\" rel=\"noopener noreferrer\">Octagon\u2122 Security methodology<\/a>.<br \/>\nWhere necessary, additional access control measures can be applied by combining technologies such as facial recognition with card readers and\/or PIN codes.<br \/>\nIn this way, the desired level of security is guaranteed, without experiencing closedness and control.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>One of the important trends in security is that security systems are increasingly being managed integrally. This applies to access control, but also to camera security or building automation. This is not only practical, it also offers additional possibilities that make access control in 2018 much smarter and more user-friendly.  <\/p>\n","protected":false},"author":6,"featured_media":274494,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wds_primary_category":0,"footnotes":""},"categories":[512,500],"tags":[602,605,624,554],"class_list":["post-248701","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-access-control","category-articles","tag-access-control-system","tag-biometrics","tag-mobile-access-en","tag-toegangsbeheer-en"],"_links":{"self":[{"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/posts\/248701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/comments?post=248701"}],"version-history":[{"count":0,"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/posts\/248701\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/media\/274494"}],"wp:attachment":[{"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/media?parent=248701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/categories?post=248701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/tags?post=248701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}