Securing Hybrid Workplaces

Cloud security service provider Brivo has produced its sixth annual Security Trends Report, which examines the user experience behind the adoption of new physical security solutions. 

The report is based on responses from 677 security professionals across the world working in over two dozen sectors.  They pointed to growing expectations for frictionless access into workplaces, as more Millennial and Gen Z cohorts enter the workplace, and a general rise in convenience as a major consideration in physical security. 

Key findings that speak to this trend include:

  •  84% of security professionals think user experience is either extremely important or very important to access control.
  • 65% pointed to user convenience as a benefit of mobile access control, speaking to the growing popularity of mobile devices as an access credential over traditional plastic security tokens.
  • Tenant and workplace experience apps are growing in popularity, ranking as the fifth most popular security system integration this year, according to the respondents. These apps give more control to employees over their office space via mobile-derived services.
  • Security professionals listed remote door management, instantaneous credential management and outsourcing oversight responsibilities as applications for cloud-based security that make their lives easier, highlighting the appreciation that security professionals have for convenience in their own work.

Responses elsewhere in the report show that data collection and system integrations are business imperatives today. 

Security professionals continue to integrate security systems with cross-functional areas but more are using access data to understand access trends and space usage (45%), find and prioritise unusual activity (42%), and give value to other departments like supply chain, process, and HR (42%). 

The latest report also reveals that today’s security professionals are optimistic about the potential of biometric access solutions and 60% predict that facial recognition will have the biggest impact in access control technology over the next three years. 

Other Findings Include:   

  • Respondents reported a surge in access control integrations. Integrations of identity and access management solutions are most common as more organisations pursue streamlined operations by connecting physical and digital security systems for added protection.
  • A lack of budget (39%) was most commonly cited as the reason for not adopting cloud-based access control solutions.
  • More organisations are looking to centralise their security, with 38% saying their organisations are partly centralised today, up from 31% in 2022’s report.

“The key takeaway from our 2023 Trends Report is that user experience and convenience are vital considerations for security professionals today, and this trend shows no sign of slowing as more cohorts of Generation Z enter the workplace with expectations for technology-enabled frictionless access,” said Steve Van Till, CEO of Brivo. 

 “Cloud-based access control collects the most valuable data for security professionals to make better informed business decisions. The integration of access control with other security platforms will be essential in meeting stakeholder expectations on convenience and delivering the next generation of access solutions.” Van Till added. 

You Might Also Read: 

PAM, IAM, Or Both?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Half Of British SMEs Have Been Attacked
Start Thinking Like A Hacker »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

Keynetic Technologies

Keynetic Technologies

Keynetic focuses on developing cybersecurity solutions for Industry 4.0.

NanoLock Security

NanoLock Security

NanoLock delivers the industry’s only end-to-end platform for the IoT and connected devices ecosystem.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

Sompo International

Sompo International

Sompo International is a global specialty provider of property and casualty insurance and reinsurance services including Cyber & Network Risk.

Leidos

Leidos

Leidos is a recognized leader in cybersecurity across the federal government, bringing more than a decade of experience defending cyber interests globally.

Netsurion

Netsurion

Netsurion powers secure and agile networks for highly distributed and small-to-medium enterprises and the IT providers that serve them.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

Gutsy

Gutsy

Gutsy uses process mining to help organizations visualize and analyze their complex security processes to understand how they actually run, based on observable event data.