Security concepts: Access control under the banner of digital transformation Digital transformation enables companies to expand their security concepts around a networked access-control system. To allow you to make use of all the benefits of this networking, the system should consistently be tailored to company demand. To this end, providers such as the German company Interflex Datensysteme GmbH offer holistic services, from consultation and configuration of tailored security systems right up to integration of useful additional features, such as your own visitor management. The following overview clarifies what scenarios are already possible with today‘s access-control systems. TEXT: BERNARD SOMMER I PHOTOS: INTERFLEX DATENSYSTEME GMBH
By the time companies and organisations are having to protect themselves against scenarios such as burglary, theft and vandalism, or espionage and white-collar crime, it is clear that secure isolation of the company IT network and associated transactions has, for a long time, no longer been enough. After all, in light of increased networking, the physical security of buildings, company premises and specialised security zones is also becoming a focus. Around 70 92 | Issue 83 | February 2020
per cent of companies in Germany already use access security systems for buildings and machines, according to an empirical study (German Federal Printing Office (pub.): IT-Sicherheit im Rahmen der Digitalisierung. Eine empirische Untersuchung in deutschen Unternehmen in Zusammenarbeit mit Bitkom Research [IT security within the framework of digitalisation: An empirical study of German companies in collaboration with Bitkom Research], April
2018). On a physical level, these are less about isolating unwanted access and much more about regulating access for various groups. This way, for instance, different access rights can be defined for employees, external service providers and visitors, and securely implemented via both the software and the hardware components using one and the same system. Meanwhile, automatic assignment of access rights is equally possible. This allows companies to manage dozens, hundreds or even thousands of access rights. Online systems enable centralised regulation and control – including for areas requiring security in banks, in research and development, at energy providers or in public spaces. Organisation and prevention According to the aforementioned empirical study of German companies, organisational or process-related IT security