How significant is physical access control?
It is important for organizations to have a robust security system to protect their facilities, employees and critical assets. A cloud-based surveillance system supported by authentication based on a person’s physical identity helps to ensure 24×7 access monitoring, reducing the time and expense involved, and simultaneously, enhancing security with proactive reporting, access control, and alerts & notifications in case of suspicious activity.
Make a difference with cidaas
When you adopt cidaas, a comprehensive user identity and access management solution, not only is your online business portal secure, but the access to your physical premise/facility can also be controlled digitally at your finger-tips! Leveraging the advantages of NFC (Near Field Communication) technology and Face Recognition, the flow of only legitimate personnel into your business facilities can now be ascertained with cidaas. Designed in such a way that minimal manual intervention is only required, cidaas could be easily integrated with security systems such as surveillance doors, intruder alarms and fire warning systems.
Face recognition-based authentication
IP cameras installed in Business facilities can be configured in the system and mapped to the respective doors using cidaas. Administrators are presented with the option to scan images of the personnel and assign the users or user groups to certain doors or areas. Based on access permissions, entry of personnel through the IP camera enabled doors can now be easily allowed or restricted.
Authentication coupled with a person’s unique physical identity goes a long way in combating the security challenges faced in protecting sensitive areas from unauthorized access, without compromising on user-convenience.
Cidaas supports Face Recognition as one of its MFA methods (Multifactor Authentication), which also includes Voice Recognition, Fingerprint recognition, Pattern recognition, TOTP and Smart Push apart from Email, SMS, IVR, Backup Codes and FIDO based verifications.
Cidaas provides this feature to administrators where NFC tag details can be configured and mapped to the corresponding doors and subsequently to the respective personnel who are expected to have access to the facility/room. These tags, that are later provided to the personnel can be used at the various entry/exit points within the facility to validate their identity with the help of installed NFC readers and provide/deny access accordingly. NFC-enabled mobile devices could also be made use of, to leverage this mode of authentication to obtain secure access.
The access permissions can be edited (assigned/revoked) by the administrator at any given point in time through the Admin portal of the business that is powered by cidaas.
Typical Use Case for access control
Consider a firm that has the following spaces:
- Server room: Only IT support personnel can access this room
- Administrative office: Only Administrators are allowed access to this room
- Conference rooms: All employees have access
- Inventory rooms: Only Maintenance & Support employees have access
- CRM system: Only Managers and Marketing & Sales team have access
- Online Process & Workflow Management System: All employees have role-based access
Cidaas eases the task of the Administrator of this Firm to ensure that only the right people have access to the respective spaces.
Upon installing IP cameras or using NFC technology, any number of doors that lead to access to the various spaces are configured in the Admin portal of the Business Firm that is supported by cidaas. On the other hand, access to online spaces such as the CRM and Process & Workflow management solutions also has to be secured.
It is here, that cidaas plays the quintessential role of linking digital and real-world identities.
All that the Administrator has to do now, is to record the identities & details of the employees based on their access/privileges and map the employee details to the respective spaces, be it physical spaces (i.e., access to doors) or online spaces (i.e., access to a CRM application).
This access mapping exercise could also serve to track attendance of the employees and have all the required information in the event of any access violations.
Access control is hence simplified with cidaas!
You could now manage and achieve instant and secure access to business facilities with cidaas, that is fast and reliable, yet scalable to cater to increasing number of employees or other business personnel with expanded authentication options!
cidaas in action
The future is here. Check out the options you can offer your customers on your portals.