Tag Archives: Authentication

Abloy UK advises companies to secure remote sites in wake of record £20 million fine for Thames Water

Abloy UK is advising companies to secure remote sites and minimise the risk of substantial fines by dint of using innovative new access control technology. This advice comes in light of the recent record fine of over £20 million given to Thames Water for polluting the River Thames with 1.4 billion litres of raw sewage.

Thames Water was functioning with reduced operational resources, in turn resulting in unmanned sites. When alarms were raised signalling issues, they were not attended to immediately – including one being ignored for 37 hours*.

Abloy UK suggests that a system such as PROTEC2 CLIQ with CLIQ Connect could prevent these kinds of events from happening by allowing access to be granted remotely, such that incidents can be dealt with on a swift basis.

AbloyUKCLIQWater

PROTEC2 CLIQ allows for the remote management of disparate or large electronic master-keyed sites, provides audit trails on locks and padlocks and allows lost or stolen keys to be invalidated, in turn assuring secure key management at all times.

CLIQ Connect enables PROTEC2 CLIQ keys to be activated through a smart phone using Bluetooth 4.0 technology, offering flexibility, time-saving and ease of use of remote access control. The system is ideally suited to organisations that have a number of engineers and contractors visiting remote sites, and offers a solution for many different sectors including defence, the utilities, telecoms, transport, education and healthcare.

Steve Wintle, head of Critical National Infrastructure at Abloy UK, said: “We can see from the example of Thames Water that businesses can be under resourced. This is often how mistakes and accidents can happen. Investment in a system such as CLIQ Connect could have saved a business such as Thames Water a significant fine, not to mention the cost of negative publicity and the impact this could have on share price. By de-centralising the authentication of access, the system can act as a secondary confirmation. Access and actions can be double-checked, thereby preventing costly incidents such as this one from occurring.”

*http://www.henleystandard.co.uk/news/home/107177/thames-water-fined-record-20million-over-sewage-leaks.html

Leave a comment

Filed under Risk UK News

HID Global predicts major secure identity trends for 2014

HID Global has issued its projections for top trends the company believes will have the greatest impact on the secure identity industry in 2014.

The predictions encompass a diverse range of solutions and technologies, including anticipated advances in physical and logical access control, secure issuance, identity assurance, visitor management, electronic ID (eID) and secure asset tracking.

HID Global’s Dr Selva Selvaratnam (senior vice-president and CTO) anticipates a decline in the use of passwords for securing resources as organisations extend strong authentication across their IT infrastructure and out to the door.

This can also accelerate the convergence of physical and logical access control that will drive a more seamless user experience when securing doors, data and the cloud.

Dr Selva Selvaratnam: senior vice president and chief technology officer at HID Global

Dr Selva Selvaratnam: senior vice president and chief technology officer at HID Global

“As a follow-up to last year’s predictions,” said Dr Selvaratnam, “we’re now sharing the top trends we believe will shape the market during 2014 and beyond. These are exciting times as the industry continues to make it even easier for organisations to improve security, adapt to evolving threats and simplify the day-to-day working life for their users.”

Key trends to look out for in 2014

Dr Selvaratnam has identified the following trends to watch in 2014:

(1) The industry is quickly moving beyond static, proprietary access control architectures to more secure, open and adaptable solutions, in turn supporting the customers’ desire for new products and technologies that enable their business

(2) Integrating physical access control with IT security will bring new benefits while changing how organisations operate

(3) Strong authentication will continue to grow in importance in the face of a rapidly changing IT security threat environment (and will also move to the door and include other factors such as biometrics and gestures)

(4) Strong authentication will increasingly be implemented using a multi-layered security strategy

(5) Mobile access control will continue to roll out in stages and use various wireless technologies

(6) The market will enter a new era of NFC authentication services

(7) The migration of intelligence to the door will continue with the further adoption of IP architectures and future capabilities of smartphones for access control

(8) Printing and encoding advancements will simplify card personalisation. The market will increasingly see faster printing and encoding solutions, more durable card materials and solutions that enable ‘anywhere/anytime’ distributed issuance capabilities

(9) Visitor management systems will continue to move beyond the businesses to schools, hospitals and other institutions where high profile incidents have proven that safety and security shouldn’t be left to paper logs

(10) There will be accelerating worldwide adoption of multi-purpose electronic ID (eID) credentials

Detailed descriptions of HID Global’s anticipated secure identity trends for 2014 trends can be found on HID Global’s blog:

Part 1 http://www.hidglobal.com/blog/whats-in-store-2014-key-secure-identity-trends-part-1
Part 2 http://www.hidglobal.com/blog/whats-in-store-2014-key-secure-identity-trends-part-2

Leave a comment

Filed under IFSECGlobal.com News