SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What are the challenges and benefits of mobile access control?

24 Jun 2021

What are the challenges and benefits of mobile access control?
Larry Anderson
Larry Anderson
24 Jun 2021

Editor Introduction

There is a broad appeal to the idea of using a smartphone or wearable device as a credential for physical access control systems. Smartphones already perform a range of tasks that extend beyond making a phone call. Shouldn’t opening the door at a workplace be among them? It’s a simple idea, but there are obstacles for the industry to get there from here. We asked this week’s Expert Panel Roundtable: What are the challenges and benefits of mobile access control solutions? 


Card image cap
Jaroslav Barton HID

Many new facilities now begin with mobile access and many others are upgrading. The discussion about lost access cards is just part of it, people keep their smartphones close and don’t share them, so one of the age-old problems with access cards is immediately solved. Additionally, most people protect their phones with passwords, PINs, or biometrics that can protect the credential on the phone from being used by a thief or opportunist. Seos credential technology enables robust mobile IDs security and access can be centrally managed and provisioned, or revoked, over the cloud, which makes it easy to add, remove or change access rights or issue credentials to visitors and contractors. Mobile access is also an extension of the brand; organizations can personalize the app, add their own corporate branding and integrate it into smart building and employee wellness apps. They’re choosing mobile access because it’s convenient, simple, secure and often more cost-effective.

Card image cap
Despina Stamatelos Genetec, Inc.

The use of mobile credentials has been on the rise for several years, and COVID has significantly accelerated that trend. There are several advantages to mobile credentials: the technology is convenient as people carry their smartphones on them all the time and less likely to get lost than an ID card or badge. The technology is more secure and makes it easy to deny access to someone fraudulently trying to enter a secured area. Mobile access control offers greater flexibility as cardholders only need their mobile device to access several facilities rather than carrying multiple credentials. Mobile credentials can be more expensive than traditional ID cards, but the benefits usually outweigh the costs. While employees may be hesitant to allow their employer to install software on their personal devices, privacy concerns can be alleviated by installing software that cannot access personal information.

Card image cap
Brian Lohse Alarm.com

Mobile access control solutions are an exciting innovation in a market where the day-to-day user experience hasn’t changed much in the last 20 years. One area that has clear benefits and challenges is in improving the user experience. On one hand, physical credentials are expensive and a hassle to administer; however, they work reliably, quickly, and predictably. Mobile credentials are convenient in that everyone already has a smartphone, and you don’t have to admin or carry cards; however, when you’re actually standing at the door they need to work as well or better than physical credentials, or the benefits are lost. Inertia is a powerful force, and if you look at the adoption of mobile credit cards, it has taken a long time for consumer behaviors to change. As the user experience improves, it’s easy to see a not-so-distant future in which physical credit and access cards are rare.

Card image cap
John Davies TDSi

There are numerous benefits to using mobile access control solutions, and it is proving to be particularly popular post-COVID due to the reduced contact required to present credentials. By presenting an authenticated mobile device using BLE or NFC, there is no need for contact by the individual, and the reader also avoids any touching, thereby significantly reducing the likelihood of disease transmission. Cost is another benefit – once the appropriate reader is installed, cards or tokens can often be discarded as users simply use their mobile devices. This also reduces the administration costs, with credentials approved centrally and then sent to the mobile device remotely, rather than needing to physically issue or retrieve cards/tokens. There are also practical and security benefits – users leverage the already stringent authentication of the mobile device (often fingerprint or facial recognition). New authentications are but can also be withdrawn instantly with security or employment changes.

Card image cap
Lulu Yin Anviz Global Inc.

During COVID, everything is contactless. Organizations usually use key cards and biometric-based access control, but we all forget our cards. We leave them at home, in our car, at our office desk, and so on. Almost every adult carries a smartphone, and people rarely forget their cell phones. Mobile access simplifies the process for the user; you don't have to worry about losing the key fob or card, and it's much more secure than key cards. Businesses could save costs by removing the need for physical cards for both employees and visitors. Everything is made easy with Anviz Mobile access which compatible with most of all Anviz access control hardware.

Card image cap
Bill Hobbs 3xLOGIC, Inc.

Nearly everyone who has carried a physical access credential has at one time or another lost it. Often, we don’t report a lost credential, assuming it will show up eventually. But the longer a missing credential goes unreported, the greater the chance of unauthorised access. Conversely, everyone carrying a smartphone knows where it is at all times. If it goes missing, an all-out search begins immediately and credentials on that device can be disabled. Multi-factor authentication makes it difficult to use that credential to gain unauthorized access, and proper device security can disable the device after multiple incorrect login attempts. Mobile apps are constantly updated, and new security policies can be easily distributed to the mobile credential. Mass notification of events can be quickly broadcast to all credential holders. Finally, mobile credentials are difficult to clone, unlike physical cards. Mobile credentials deployed across all users ensure a safe environment.

Card image cap
Deon Chatterton Safetrust Inc.

Mobile access control solutions can come with some challenges; however, the benefits can outweigh these challenges. Some people are reluctant to put company applications on their personal devices or may find taking their phone out of their pocket or purse inconvenient when their company may require them to wear a badge anyway. Others report inconsistent performance — sometimes they may leave their phone in their pocket, and it works, while other times they may have to touch their phone to the reader for it to work. And some perceive the cost of a mobile credential to be more expensive than a physical badge. Since a person usually has their phone in their hand already, it is much easier to hold it up to the reader than to fumble for their badge. Users can also store multiple badges in their mobile phones to get into more than one location.

Card image cap
Scott Lindley Farpointe Data, Inc.

Many mobile access credential solutions require the use of back-end portals. For hackers, portals can be rich targets, often containing sensitive end-user data. These types of mobile solutions so often force the users to register themselves, and sometimes their integrators, for every application. Each registration requires the disclosure of sensitive personal information. Bookkeeping alone can be confusing. Farpointe's Conekt distributes credentials with features that allow the user to register their handset only once and need no portal accounts, activation features, or renewal fees. Secondly, OSDP Verified equipment ensures that security equipment such as card and biometric readers from one company interface easily with control panels and equipment from another manufacturer, fostering interoperability among security devices. Customers’ new equipment will provide bi-directional communications between the access control panel and the reader. It will also make standard the option for powerful encryption in support of advanced security applications.

Card image cap
Tony Smith IDL

We have been offering discrete integrations between our turnstiles and mobile devices for some time now, and striking the balance between the required level of security, whilst offering a user-friendly entrance experience, remains a top priority. One of the key benefits of upgrading from traditional fobs or access control cards to mobile devices is the flexibility they offer. People carry their phones everywhere with them and wear smartwatches, which makes them a familiar and convenient access control method for regular employees as well as occasional visitors. Additionally, these BYODs offer a touchless and hygienic authentication method when accessing a building, which is now more important than ever. These mobile devices do have some drawbacks, however, as devices can be easily mislaid, stolen, or broken. Whether our turnstiles need to integrate with smartphones and watches for office users or wristbands for gym users, there’s an integration solution for everyone.

Card image cap
Brad Kamcheff Aiphone Corp.

From an intercom perspective, the biggest benefit is also one of the biggest challenges. Users are able to visually confirm visitor identity, answer their door, and allow visitors building access—all from their mobile devices. The benefit is the freedom to answer their door from anywhere. Users are no longer required to be on-site to greet visitors, receive packages or ensure their front door is secure. Of course, the downside to answering a door from anywhere is putting the responsibility of screening guests on the user, as well as the different levels of responsibility that users now have in allowing building access.

Card image cap
Charles (Chuck) O'Leary Open Options

The desire for mobile access control is only growing, and manufacturers are working hard to create innovative, robust solutions. While there are a few challenges that exist with the transition to mobile access control, the benefits outweigh the challenges. Typically, mobile access control is recognized as a safer, more convenient, and more reliable option when compared to normal card-reader-managed access control solutions. So, what's the problem? When an organisation decides to transition to a mobile access system, the problem often occurs when attempting to force the old system to integrate with the new without making the proper updates. Select a mobile access control system that is fully designed to be a mobile access system. Access control ultimately authenticates the users by recognizing a card or tag, a PIN, or utilises biometrics. A smartphone already houses these options, and the users often already have a 2-factor verification set in place.

Card image cap
John Nemerofsky SAGE Integration, Inc.

Enterprise organisations are embracing the concept of employee-owned mobile devices as part of an access control solution. The many benefits include reduced costs of procuring, storing, and printing plastic credentials and, unlike traditional badges, smart credentials may be remotely reused, transferred, issued, or deactivated. Employees require less training as they are familiar with their smartphones and are less likely to share their expensive devices than a physical credential or PIN. Also, there’s the convenience of having authorised visitors bypass the front desk after receiving an emailed virtual credential and app. Despite the advantages, a total mobile solution presents challenges. A 2021 market research study found 15% of U.S. adults don’t own a smartphone. Enforcing hardware standards is challenging when replacement devices are purchased on an employee’s timetable. And employers must stress the importance of password hygiene. Hackers may gain access using stolen phones lacking strong passwords and, ideally, two-factor authentication.


Editor Summary

We are all less likely to lose our phone than to lose an access control card. Or, at least, we are likely to try harder to find it! The broad utility of smartphones in our lives bolsters the case for adding one more use case to the list. As our Expert Roundtable panelists point out, there are other advantages, too, not to mention a few challenges. However, the industry's path to a future when mobile access control is pervasive will likely have some bumps along the way.

  • Related links
  • Anviz Access control controllers
  • Anviz Access control system accessories
  • Anviz Access control software
  • Genetec Access control software
  • Genetec Access control controllers
  • HID Access control controllers
  • HID Access control software
  • IDL Access control software
  • IDL Access control system accessories
  • TDSi Access control software
  • TDSi Access control system accessories
  • TDSi Access control controllers
  • Anviz Electronic locking devices
  • Anviz Access control readers
  • HID Access control readers
  • Pyramid Series Proximity Access control readers
  • TDSi Access control readers
  • TDSi Electronic locking devices
  • TDSi Electronic keypads
  • Related categories
  • Access control controllers
  • Access control system accessories
  • Access control software
  • Access control readers
  • Electronic locking devices
  • Electronic keypads
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

Explore mobile access control: overcoming challenges, embracing benefits, and boosting security in the evolving digital landscape.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec