Summary is AI-generated, newsdesk-reviewed
  • Smartphones enhance access control with secure, cloneless digital credentials.
  • Mobile devices support longer-distance communication, improving physical security.
  • Enterprises are exploring mobile access control for enhanced convenience and security.

Smartphones offer a new alternative to traditional physical access control form factors such as smart cards or fobs. Convenience is the most obvious benefit, but there are others. Here are some advantages of using smart devices for access control:

1. Less vulnerability to cloning when compared to magstripe or low-frequency proximity cards. Digital credentials and mobile IDs are securely stored and protected.

2. Longer-distance communication, which allows readers to be mounted on the safe side of a door.

3. Less likely to be stolen or shared – everyone keeps up with their smartphone!

4. Easier revocation of access rights remotely in case a mobile device is compromised.

5. Greater support for multi-factor authentication -- and more security.

Leveraging mobile devices for access control

Considering more than 500 million smartphones were sold in 2014, the opportunity is huge to leverage these devices for use in physical and logical access control systems. Using mobile devices to control physical access is the obvious next step for both employees and enterprises. To fully realise the opportunity, enterprises need to understand the technologies and how they can be implemented for physical and logical security applications.

Driven largely by convenience and operational efficiency, enterprises are increasingly seeking to leverage the full potential of a mobile-first world. Understanding the technology – and the opportunities it presents – is the first step. Convenience is only the beginning.

A new white paper from HID Global provides a useful overview of what enterprises and their employees need to know about the potential of mobile access control.

Click Here to Download the White Paper Now!

Discover how AI, biometrics, and analytics are transforming casino security

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...