Securing Hybrid Workplaces

Cloud security service provider Brivo has produced its sixth annual Security Trends Report, which examines the user experience behind the adoption of new physical security solutions. 

The report is based on responses from 677 security professionals across the world working in over two dozen sectors.  They pointed to growing expectations for frictionless access into workplaces, as more Millennial and Gen Z cohorts enter the workplace, and a general rise in convenience as a major consideration in physical security. 

Key findings that speak to this trend include:

  •  84% of security professionals think user experience is either extremely important or very important to access control.
  • 65% pointed to user convenience as a benefit of mobile access control, speaking to the growing popularity of mobile devices as an access credential over traditional plastic security tokens.
  • Tenant and workplace experience apps are growing in popularity, ranking as the fifth most popular security system integration this year, according to the respondents. These apps give more control to employees over their office space via mobile-derived services.
  • Security professionals listed remote door management, instantaneous credential management and outsourcing oversight responsibilities as applications for cloud-based security that make their lives easier, highlighting the appreciation that security professionals have for convenience in their own work.

Responses elsewhere in the report show that data collection and system integrations are business imperatives today. 

Security professionals continue to integrate security systems with cross-functional areas but more are using access data to understand access trends and space usage (45%), find and prioritise unusual activity (42%), and give value to other departments like supply chain, process, and HR (42%). 

The latest report also reveals that today’s security professionals are optimistic about the potential of biometric access solutions and 60% predict that facial recognition will have the biggest impact in access control technology over the next three years. 

Other Findings Include:   

  • Respondents reported a surge in access control integrations. Integrations of identity and access management solutions are most common as more organisations pursue streamlined operations by connecting physical and digital security systems for added protection.
  • A lack of budget (39%) was most commonly cited as the reason for not adopting cloud-based access control solutions.
  • More organisations are looking to centralise their security, with 38% saying their organisations are partly centralised today, up from 31% in 2022’s report.

“The key takeaway from our 2023 Trends Report is that user experience and convenience are vital considerations for security professionals today, and this trend shows no sign of slowing as more cohorts of Generation Z enter the workplace with expectations for technology-enabled frictionless access,” said Steve Van Till, CEO of Brivo. 

 “Cloud-based access control collects the most valuable data for security professionals to make better informed business decisions. The integration of access control with other security platforms will be essential in meeting stakeholder expectations on convenience and delivering the next generation of access solutions.” Van Till added. 

You Might Also Read: 

PAM, IAM, Or Both?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Half Of British SMEs Have Been Attacked
Start Thinking Like A Hacker »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Cloud Industry Forum (CIF)

Cloud Industry Forum (CIF)

Cloud Industry Forum is a non-profit industry body that champions and advocates the adoption and use of Cloud-based services by businesses and individuals.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

Fidus Information Security

Fidus Information Security

Fidus is a team of security professionals providing Penetration Testing and Cyber Security Consulting services throughout the UK and worldwide.

Arab Information & Communication Technologies Organization (AICTO)

Arab Information & Communication Technologies Organization (AICTO)

The Arab ICT Organization (AICTO) is an Arab governmental organization working under the aegis of the league of Arab States.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMI Level-3 ISO 9001-2008, 27001-2013 certified global consulting and implementation company focused on Information Security and Cyber Security.

Chainlink

Chainlink

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology.

Trianz

Trianz

Trianz Cybersecurity Services are Powered by One of the World’s Largest Databases on Digital Transformation. We Understand Evolving Risks, Technologies and Best Practices.

West Midlands Cyber Resilience Centre (WMCRC)

West Midlands Cyber Resilience Centre (WMCRC)

The East Midlands Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

Vantage Point Security

Vantage Point Security

Vantage Point are specialists in penetration testing and application security with a focus on the industries undergoing rapid digital transformation.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.