Security Buyer sits down with Sarah Thompson, Chief Product Officer at ICT to discover more about the company who pioneered ‘unified systems’
Please introduce yourself and give a brief insight into Integrated Control Technology (ICT)?
I’m Sarah Thompson, Chief Product Officer at ICT (Integrated Control Technology). With a background in strategy, business transformation, and executive leadership, I’ve spent my career focused on building impactful products at global tech companies that truly make a difference.
ICT has been a pioneer in security solutions for over 20 years. Back when “unified systems” weren’t the buzzwords they are today, we were already leading the way with innovative access control, intruder detection, and building automation technologies.
What drew me to ICT is its mission: not just protecting people and property, but creating a world where safety is something you can truly feel.
How would you address the perception of access control readers being a “grudge” purchase, and what role do they play as a critical component of a security system?
I can see how some might perceive it as a “grudge” purchase – they can be bulky and obtrusive and at their most basic can be thought of as a fancy lock. But when an access reader is part of a full access, security and building automation system is one of the most important parts of the system. The reader not only allows or denies access, but they create a comprehensive reporting system that lightens day-to-day workloads and allows for faster responses in an emergency. They can be used to trigger duress signals to authorities without the need for audible alarms that may cause an intruder to become reckless or to leave before being apprehended. They can also increase awareness and operational efficiency when you have a reader that has a LED strip like ICT’s giving you instant status updates based on the colour of the strip.
In terms of security, how does ICT ensure its readers are resilient to modern threats, such as tampering or unauthorised access?
At its core, ICT is an access and security company, so our devices are built with the leading designs in security. From protocols like OSDP 2.2 to functions like signed firmware updates and use of a secure access module – which isolates authentication, encryption, and decryption processes within the reader – which will be available in our upcoming TSL line, we ensure our access readers are built to withstand the ever-changing security landscape. That’s why you’ll always see us pushing for smart cards or mobile credentials – while a prox card may be easy, it’s the least secure solution you can have.
How important is credential compatibility in access control systems, especially for large sites with existing cards or tags, and how does ICT address this challenge?
It’s definitely one of the things we hear about most from people who want to move from their existing access system to Protege – ‘can I bring my card with me?’ Which is not a surprise at all. The cost and time to replace credentials is a real barrier for a lot of businesses looking to come onto a modern, comprehensive system. We understand the pain this can entail. That’s why our readers are set up to read a wide variety of credentials, from low security proximity credentials like iClass dual/13.56, GProx, HID Corp1000, Indala to smart MIFARE DESFire EV1-3.
Can you explain the cost-saving and operational benefits of ICT readers being compatible with a wide range of credentials and technologies?
Think about a company that has 300 employees and imagine not only the cost, but the amount of work required to replace all the cards. Interrupting everyone’s workday, then having to deactivate every single card.
If a company uses prox. cards, we of course always recommend moving to a smart card due to the high vulnerabilities that come from low-tech cards. But we understand the difficulties of doing this all at once, which is why our dual-technology readers can read both low and high frequencies, there’s a built-in path that makes it easy to move to a more secure access solution at your own pace.
Could you share examples of how ICT readers have been used to provide operational efficiencies?
We actually recently had an amazing opportunity to help an innovative self-service hotel in Iceland – Hótel Hálönd. Our local dealer, Securitas Iceland, took up the challenge and were able to create a completely automated system by integrating Protege GX, our access readers, and their reservation system.
At Hótel Hálönd, the integration syncs customer bookings and hotel access rights so when guests are confirmed, access codes are automatically sent within 15 minutes. It also ensures that PINs are only usable for the booking period and deleted when guests leave. The Keypad Readers connected to each door means that each unique guest PIN can be used to access different areas like guest rooms and the ski/bike equipment storage. Overall, the automated solution cuts costs for the hotel which are then passed along to customers.
What are the benefits of incorporating keypad functionality into access readers, and how can this enhance security and flexibility for end-users?
We’re all human right? We leave our card or tag at home or forget to charge our phones. Having a keypad offers the flexibility for users to still gain access. By setting up permissions so that users can use their credential or a PIN, there’s no need to wait for someone else to let you in or to call up your security team.
You can also use a keypad to set up two-factor authentication for high-security areas, meaning users need both their credential – whether that’s their phone or their card – and a PIN to gain access to an area.
Read more exclusives and news in our latest issue here.
Never miss a story… Follow us on:
LinkedIn: Security Buyer
Twitter (X): @SecurityBuyer
Facebook: @Secbuyer
Media Contact
Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: editor@securitybuyer.com