Intelligent Tech Channels Issue 03 | Page 28

FUTURE TECHNOLOGY

Building a tap based access control platform

Organisations need to consider integrated access control platforms to jointly secure IT applications and physical access, recommends Tim Phipps from HID Global.

With the move to a mobile and cloud first world, corporate data has become increasingly difficult to protect. Employee expectations have changed – they want to be able to access corporate cloud applications, data and services anywhere, at any time, using the device of their choice. This can potentially make networks significantly more vulnerable to security breaches.

Reliance on passwords alone is not enough. When hackers steal an employee’ s user name and password, they can often move through the network undetected and upload malware programmes to other systems. Now, with the advent of a security model called tap authentication, it is possible to control access to data with a much more convenient process, using the same identification card that controls access to a company’ s facilities.
With tap authentication, users simply tap their smart cards to laptops, tablets, phones and other NFC-enabled devices for easy and convenient access to network resources, cloud applications and webbased services. This quick tap of the card to a device is much easier and secure than passwords. It is faster and more seamless and convenient than dedicated hardware one-time passwords or other physical devices. Perhaps most important for users, it offers the convenience of being able to access data and cloud-based applications with the same card that opens doors.
Today’ s threats will not diminish anytime soon. Nor will the cost of a data breach. IBM recently announced in its Security Services Cyber Security Intelligence Index Report that phishing, malware and other cyber threats are now costing organisations up to 19 % in revenue and 21 % in lost productivity, amongst other financial hits. Protecting access to corporate data is becoming more crucial. One of the biggest problems is an over-reliance on passwords. Identifying and validating workforce identities used to be relatively easy and relied on the combination of a username and a password that users typed in to a PC to authenticate themselves to the machine and to the network. Workforce computer users had one password, and that password was used in one place only: at a stationary workstation in the office or at home. Once the user logged in, they had access to every application they needed to do their job.
Today, however the enterprise landscape is rapidly changing. We now live in a mobile-first, cloud-first world where there is no longer a single device that is used to access corporate data and services. On top of this, corporate security policies have changed, requiring users to authenticate themselves more often. For example, employees at the National
28 Issue 03 INTELLIGENT TECH CHANNELS