Securing Hybrid Workplaces

Cloud security service provider Brivo has produced its sixth annual Security Trends Report, which examines the user experience behind the adoption of new physical security solutions. 

The report is based on responses from 677 security professionals across the world working in over two dozen sectors.  They pointed to growing expectations for frictionless access into workplaces, as more Millennial and Gen Z cohorts enter the workplace, and a general rise in convenience as a major consideration in physical security. 

Key findings that speak to this trend include:

  •  84% of security professionals think user experience is either extremely important or very important to access control.
  • 65% pointed to user convenience as a benefit of mobile access control, speaking to the growing popularity of mobile devices as an access credential over traditional plastic security tokens.
  • Tenant and workplace experience apps are growing in popularity, ranking as the fifth most popular security system integration this year, according to the respondents. These apps give more control to employees over their office space via mobile-derived services.
  • Security professionals listed remote door management, instantaneous credential management and outsourcing oversight responsibilities as applications for cloud-based security that make their lives easier, highlighting the appreciation that security professionals have for convenience in their own work.

Responses elsewhere in the report show that data collection and system integrations are business imperatives today. 

Security professionals continue to integrate security systems with cross-functional areas but more are using access data to understand access trends and space usage (45%), find and prioritise unusual activity (42%), and give value to other departments like supply chain, process, and HR (42%). 

The latest report also reveals that today’s security professionals are optimistic about the potential of biometric access solutions and 60% predict that facial recognition will have the biggest impact in access control technology over the next three years. 

Other Findings Include:   

  • Respondents reported a surge in access control integrations. Integrations of identity and access management solutions are most common as more organisations pursue streamlined operations by connecting physical and digital security systems for added protection.
  • A lack of budget (39%) was most commonly cited as the reason for not adopting cloud-based access control solutions.
  • More organisations are looking to centralise their security, with 38% saying their organisations are partly centralised today, up from 31% in 2022’s report.

“The key takeaway from our 2023 Trends Report is that user experience and convenience are vital considerations for security professionals today, and this trend shows no sign of slowing as more cohorts of Generation Z enter the workplace with expectations for technology-enabled frictionless access,” said Steve Van Till, CEO of Brivo. 

 “Cloud-based access control collects the most valuable data for security professionals to make better informed business decisions. The integration of access control with other security platforms will be essential in meeting stakeholder expectations on convenience and delivering the next generation of access solutions.” Van Till added. 

You Might Also Read: 

PAM, IAM, Or Both?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Half Of British SMEs Have Been Attacked
Start Thinking Like A Hacker »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

National Defense Industry Association (NDIA)

National Defense Industry Association (NDIA)

The National Defense Industrial Association Cyber Division contributes to US national security by promoting interaction between the cyber defense industry, government and military.

PrivateCore

PrivateCore

We protect data-in-use from hackers trying to steal data such as encryption keys, certificates, intellectual property.

Guardian Data Destruction

Guardian Data Destruction

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services.

RiskXchange

RiskXchange

RiskXchange's cybersecurity risk rating solution helps businesses solve complex cybersecurity and compliance challenges by providing a 360-degree view of your cybersecurity posture.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

Centraleyes

Centraleyes

Centraleyes (formerly CyGov) is a cutting-edge integrated cyber risk management platform that gives organizations unparalleled understanding of their cyber risk and compliance.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Guardio

Guardio

Guardio develop tools and products to combat modern web and browser threats.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

PolySwarm

PolySwarm

PolySwarm is a crowdsourced threat intelligence marketplace that provides a more effective way to detect, analyze and respond to the latest threats.

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.

StrongBox.Academy

StrongBox.Academy

StrongBox.Academy provides cybersecurity training courses that are tailored to the specific needs and challenges of the industry.

Brightworks Group

Brightworks Group

BrightWorks Group offer comprehensive technology operations and security operations consulting services, tailored to meet your specific needs.