Making Multi-factor Authentication Easier in the Enterprise
The weakest point of your network are likely your legacy Video Surveillance and Access Control systems. Physical Security routinely undermines Network Security.
More security with fewer hassles
The intent of multi-factor authentication (MFA) is to provide a higher degree of assurance of the individual attempting to access a physical location by creating a multi-layered mechanism that will be very difficult for an unauthorized user to defeat.
Today’s single factor is your badge. Two factors might be your badge and your face. Three factors could be your badge your face and your phone in your pocket (on corporate wifi or geolocated near the door). In the future, it will probably your face and your phone in your pocket — the credential will go away in daily use. The overall framework of multi-factor authentication system comprises of three critical elements:
Something you know, such as a password or a paraphrase. This method requires the user to provide information that can be verified, such as password/paraphrase. PIN, or the answers to secret questions.
Something you have, such as a token device or smartcard. This method involves the user to present a specific item in his possession that can be verified such as physical token, a key fob, an employee access card, or a phone’s SIM card.
Something you are, such as a biometric. This method involves verification of characteristics inherent to an individual, such as retina scans, fingerprint scans, voice recognition, and facial recognition etc.
Other factors such as geolocation and time can also be additionally configured in the system to add more layers of security. The fundamental requirement being that all these authentication mechanisms must be independent of each other.
Multi-factor authentication is not just a more secure and reliable way of managing security for physical locations, its also more practical and hassle-free. Many times a key card is lost or damaged, making the organization vulnerable without multiple steps to determine whether the user is in fact allowed access to a specific door or building. The shift to multi-factor authentication safeguard’s an individual’s identity through multiple levels of access control.
The access control industry is seeing a gradual shift from card access readers toward multi-factor authentication in order to safeguard identities and critical assets. It is the next wave in physical security space as enterprises look to protect critical data and assets from internal and external threats. Cost and complexity of instituting this technology has been cited in the past as reasons that stopped corporate houses to invest in the system, but more recent technological innovations helped overcome all these limitations.
Cloudastructure Enables Multi-factor Authentication in its Access Control System
Cloudastructure’s new Multifactor Authentication feature allows you to use your smartphone as your access credential. Or your face. Or your card. Or any combination of the three.
You can now pick and choose the authentication factors you want in your access control system – every factor must be present for the entry to be granted. Check more boxes within a factor to allow for more flexibility (e.g. phone on corporate wifi OR phone near door can both be selected at once).
Also, one can configure variable settings for different doors that exist within the building complex. The front lobby door might be set to open on any face, M-F 9am-5pm. The IT server room might need a badge, phone and face to open. Setup each door the way you want it, how you want it, with as many or few ‘Factors’ as you want.
We partner with system integrators, physical security personnel and the IT department to ensure that your investment in the physical access control system brings a higher level of security – one that is more efficient as well. This is truly a case of if one is good, two is better.