SourceSecurity.com US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Unique perspectives

Smartphones offer many advantages over cards and fobs for access control

Considering more than 500 million smartphones were sold in 2014, the opportunity is huge to leverage these devices for use in physical and logical access control

Smartphones offer a new alternative to traditional physical access control form factors such as smart cards or fobs. Convenience is the most obvious benefit, but there are others. Here are some advantages of using smart devices for access control:

1. Less vulnerability to cloning when compared to magstripe or low-frequency proximity cards. Digital credentials and mobile IDs are securely stored and protected.

2. Longer-distance communication, which allows readers to be mounted on the safe side of a door.

3. Less likely to be stolen or shared – everyone keeps up with their smartphone!

4. Easier revocation of access rights remotely in case a mobile device is compromised.

5. Greater support for multi-factor authentication -- and more security.

Leveraging mobile devices for access control

Considering more than 500 million smartphones were sold in 2014, the opportunity is huge to leverage these devices for use in physical and logical access control systems. Using mobile devices to control physical access is the obvious next step for both employees and enterprises. To fully realise the opportunity, enterprises need to understand the technologies and how they can be implemented for physical and logical security applications.

Driven largely by convenience and operational efficiency, enterprises are increasingly seeking to leverage the full potential of a mobile-first world. Understanding the technology – and the opportunities it presents – is the first step. Convenience is only the beginning.

A new white paper from HID Global provides a useful overview of what enterprises and their employees need to know about the potential of mobile access control.

Click Here to Download the White Paper Now!

Larry Anderson

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com US Edition's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

Download PDF Version

Follow us for latest editorial and commercial opportunities


Please rate this article


Related videos
Featured White Paper

What Do I Need to Know to Successfully Deploy Mobile Access?

This white paper discusses what you need to know in preparation to deploy a mobile access solution. Using a mobile device to gain access to buildings is not only about solving a particular problem; it's also about doing things better.

Confidence and education in the use of contactless applications and technologies, such as Near Field Communications (NFC) and Bluetooth, are continuously growing. In the era of mobility and cloud computing, companies are increasingly concerned about the security and protection of their physical environment. Correctly implemented, mobile access has the potential to revolutionise the way we open doors.

HID have produced this guide to mobile access configuration to explore the underlying technologies which enable mobile access and discuss what you need to know to implement mobile access control.


See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition