background image
1 6 · d e t e k t o r i n t e r n a t i o n a l
Special Feature: Access Control
As security threats evolve and
organisational needs become more
complex, the question isn't just
whether your access control system
works ­ it's whether it still fits your
organisation's current and future
requirements.
"The reality is that many
facility managers assume their
existing access control technology
is meeting their security needs
simply because it's still granting
entry to authorised personnel,"
says Jaroslav Barton, Director of
Product Marketing, Physical Ac-
cess Control, at HID.
"However, functional and
optimal are two very different
things, especially when it comes
to security, compliance, and
operational efficiency."
Reassessing your access
control foundation
For many organisations, the access
control systems installed years ago
were perfectly adequate for their
needs at the time. These systems
reliably controlled who could enter
which areas and, for environments
with basic security requirements,
they may continue to serve that
purpose effectively.
However, as organisations
grow, face new regulatory require-
ments, or operate in environ-
ments where security is critical,
the limitations of older access
control technology become more
apparent.
"Legacy systems that rely on
basic proximity cards and out-
dated communication protocols
may not provide the level of
security, auditability, or integra-
tion capabilities that present-day
organisations require," Barton
explains.
This distinction is particularly
important for organisations han-
dling sensitive data, operating in
regulated industries, or managing
facilities where unauthorised ac-
cess could have serious conse-
quences.
"In these environments, access
control isn't just about conveni-
ence ­ it's a critical component
of the overall security infrastruc-
ture."
Three clear signs
it's time to upgrade
Jaroslav Barton highlights three
key signs that it's time to modern-
ise your access control system:
1. Security requirements have
outgrown your technology
If security is critical to your
organisation's operations, legacy
access control technology may no
longer provide adequate protec-
tion. Older systems that rely on
unencrypted credentials and out-
dated protocols, such as Wiegand,
were designed for a very different
threat landscape than today's.
Organisations handling sensi-
tive data, operating in high-secu-
rity environments, or managing
facilities where unauthorised
access could have serious conse-
quences need systems that can
withstand sophisticated attacks.
This means encrypted credentials,
secure communication between
readers and controllers, and com-
prehensive audit trails.
The key question isn't whether
your current system has security
flaws ­ it's whether its vulner-
abilities align with your organisa-
tion's risk tolerance and security
requirements.
2. Keeping up with
regulatory requirements
Regulatory frameworks across
Europe are increasingly recognis-
ing the link between physical
and digital security. The EU's
NIS2 Directive, which came into
effect in October 2024, requires
organisations in critical sectors to
implement comprehensive cyber
security measures ­ including
assessments of their physical access
control systems and supply chain
security.
Similarly, the UK's Govpass
programme aims to replace the
patchwork of different creden-
tials government employees have
historically carried with standard-
ised, encrypted credentials. For
the hundreds of UK departments
and agencies that must comply
with Govpass, this means upgrad-
ing legacy access control systems.
Beyond these initiatives,
industry-specific regulations are
also driving demand for more
secure, auditable solutions.
Organisations subject to these
requirements need systems that
provide detailed access logs and
demonstrate sufficient security to
The card reader mounted by your office entrance
has been faithfully serving your organisation for
years ­ perhaps even decades. Employees tap their
cards, the door opens, and people gain access.
From a basic functionality standpoint, everything
seems to be working. But is it?
In this article, Jaroslav Barton of HID shares his
views on when it's time to upgrade your access
control system.
Three signs it's time to upgrade your access control system
Employees and visitors expect the same convenience they get from their smartphones
everywhere else ­ including work, states Jaroslav Barton.
Jaroslav Barton, Director of Product
Marketing, Physical Access Control,
at HID.
Jaroslav Barton, HID: