Download PDF version Contact company

Physical Access Control Systems (PACS) continually evolve as vulnerabilities are identified. It is no exaggeration to say most RFID cards used for access at office buildings, data centers, factories, and government buildings are susceptible to card cloning or hacking.

Card cloning devices can be obtained online for as little as US$ 10. The battle is ongoing and is relatively cost-effective to put right.

Legacy PACS

The majority of legacy PACS installed use standard open transmission protocols, such as Wiegand and MIFARE. These cards have been in use for many years, without being managed by industry standards, resulting in hundreds of different card types being developed and used.

The proliferation of 125KHz proximity and latterly Mifare standard proximity adoption revolves around perceived convenience and low cost however these cards have little to no encryption and therefore vulnerable to attack. The following offers practical ways to update existing systems and future-proof new ones.

Two-factor authentication

MIFARE DESFire EV2 allows for fast and highly secure encrypted data transmission with read/write capability

Two-factor authentication is the combination of two out of the three possible methods (something one knows, something one has, or/and something one is). Most access control systems will couple an access card with a pin code.

MIFARE DESFire EV2 allows for fast and highly secure encrypted data transmission with read/write capability. This high frequency 13.56MHz technology is ideal for access control management.

Secure credential technology

In this ever-expanding universe of credential technologies, it is advisable to opt for open global standards for both air interface and cryptographic methods. MIFARE DESFire EV2 is the latest secure credential technology to hit the market that provides 128Bit encryption and is compliant to all 4 levels of ISO/IEC 14443A and uses optional ISO/IEC 7816-4 commands.

Put simply, these cards cannot be copied or cloned and offer the additional benefit of being used to exchange data with third party applications, such as cashless vending and logical access control systems.

Mobile access

Smartphones are becoming increasingly commonplace in replacing access cards in the security industry. Mobile credentials are easy to assign, monitor, and revoke in real time. They cannot be copied or duplicated, and users are less likely to share their phone than key card.

From a security and convenience standpoint, mobile access is second to none.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?