Sequr Releases New Cloud-Based, Smartphone Access Control Solution

Sequr says the new solution built on its physical access control platform converges physical security with cybersecurity.

ATLANTA — Sequr, a Cloud-based mobile access control platform, announces the release of Sequr Access Sync to automate perimeter security for modern buildings.

According to Sequr, many organizations protect their databases with a technology called identity and access management (IAM) software, which enables highly automated enforcement of access rules for every user.

Sequr Access Sync can connect to every organization’s IAM deployment thanks to support for all leading IAM solutions on the market. From there, Sequr draws on the rich security information that an organization’s IAM system contains about every person to intelligently determine how to manage their physical access, according to the company.

Administrators can customize the physical perimeter’s automated behavior using a rules engine with set-it-and-forget-it capabilities.

Access control is a fundamental requirement for any organization to achieve security compliance and to pass their regular security audits. Misplaced or stagnant employee access credentials can be dangerous,“ says Sequr Chief Technology Officer Mishi Patel. “With Sequr, admins never have to worry about unauthorized access to the office. They can define granular access rules in the cloud that automatically keep the physical perimeter secure and in sync with the organization.”

So how does it work? Sequr explains below:

Data-driven onboarding​. Sequr Access Sync automatically recognizes individuals who require access to the facility or office right after their profile is created in the organization’s IAM personnel database as part of the routine onboarding process. Then, Sequr pulls security data from the IAM system including the person’s job role, departmental affiliation, work location and more to determine how to best manage their access.

Automated management​. Administrators can define set-it-and-forget-it onboarding rules for assigning access. Rules can encompass specific doors, elevators and  gates as well specific access schedules. For example, a company might create a rule to assign individuals access to the building entrance, parking lot gate and elevator from 9am to 5pm on work days. Sequr Access Sync can also assign every person access to their specific work area (e.g. if a person’s IAM profile shows they’re part of the marketing department, they would receive access to the marketing department’s door on top of their other credentials.)

Powerful adaptability. ​Using a facility’s predefined rules, Sequr Access Sync can automatically adapt the physical perimeter to security changes. For example, if a person is promoted from the marketing department to the executive suite, Sequr Access Sync will become aware of the change thanks to the IAM integration and update the access credentials on that person’s mobile device.

Responsive security. ​The Sequr-powered perimeter can intelligently adapt itself to security changes such if a person moves to a new role with expanded facility access, a different work schedule, or even a different company facility. Access credentials that are no longer needed are immediately removed with no need for manual input. This prevents the build-up of unused credentials and thus avoids the security gaps that can form over time due to human oversights when deprovisioning must be done manually.

Sequr Access Sync is available now with support for all leading IAM solutions on the market including Google G Suite Directory, Microsoft Active Directory, Okta, OneLogin, Auth0, Bitium and Centrify.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters