SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check out our special report on casino security

Get it now!

The Municipality of Liminka in Finland becomes a model in enhanced security and user experience in recreation facilities with HID Mobile Access

The Municipality of Liminka in Finland becomes a model in enhanced security and user experience in recreation facilities with HID Mobile Access
Contact company
Contact HID
icon Add as a preferred source Download PDF version
Related Links
  • HID Mobile Access and mobile-enabled readers deployed by Varso Place in Warsaw, Poland
  • How are edge devices transforming security?
  • What does the Metaverse mean for security?

Located in Northern Finland, by the sea in northern Ostrobothnia, the Municipality of Liminka was founded in 1477 and is internationally known for its breath-taking nature and being the main route for several species of migrating birds.

With a population of more than 10,000, the majority (56%) of whom are between the ages of 16 and 56, Liminka boasts the services, safety and nature settings that make it particularly attractive to young families.

Optimising physical and data security

The cost to replace the key tags, which were easily lost and misused, was problematic

Seeking to improve utilisation and optimise physical and data security in its recreational facilities, Liminka’s officials determined the need to replace the keyless entry system, controlling access to meeting rooms, indoor gym equipment, and outdoor sports facilities.

The cost to replace the key tags, which were easily lost and misused, was problematic, and efforts to utilise text messaging to deliver entry codes suffered from delays that were far too long for most users.

Deploying mobile access control in recreational facilities

To enhance security and convenience, the Municipality of Liminka decided to implement mobile access control across the municipality’s recreational facilities.

The new system would also eliminate key tag replacement costs and improve the experience for people using the municipality’s gym and recreation facilities, which would potentially generate an uptick in visitor attendance and room bookings.

HID Mobile Access and Signo Readers installed

Working with Schneider Electric’s EcoStruxure Security Expert access system, which leverages the HID SDK (Software Developer Kit), Liminka implemented HID Mobile Access, Seos Credential Technology and HID Signo Readers, in order to provide secure, convenient digital access control throughout the municipality’s recreation facilities.

Doing so allowed Liminka to take advantage of an increasingly mobile-first world

Doing so allowed Liminka to take advantage of an increasingly mobile-first world, by enabling mobile devices to function as secure access credentials.

Upon registration, facility users simply download/install an app on their smartphone, smartwatch or other mobile device, in order to automatically receive their mobile ID. This convenient, touchless credentialling system allows for immediate facility access, simply by presenting the mobile device to HID Signo Readers located throughout the buildings.

User data stored securely on the HID Origo cloud platform

User data is securely stored on the HID Origo cloud platform, enabling administrators to seamlessly create, manage, issue and revoke credentials, and assign access levels.

“The readers offer unparalleled security via a multi-layered model that ensures data authenticity and privacy. Further, data stored on the ISO 27001-certified platform provides valuable and actionable insights into who accessed specific facilities, when and for how long,” said Kimmo Honka, the IT Manager for the Municipality of Liminka.

HID Mobile Access solution integrated into room booking system

To leverage all the benefits of user data and mobile credentialing that the HID Software Developer Kit (SDK) provides, the HID Mobile Access solution was also integrated into Liminka’s room booking system – in cooperation with Asio and Seniortek.

The transition was undertaken incrementally, so as to ensure compatibility with the existing IT infrastructure and to maximise user adoption.

Streamlined access management for the municipality

HID Mobile Access can be managed from anywhere, without requiring in-person interactions

Along with a more satisfying user experience, the resulting system streamlined access management for the municipality. From an operational perspective, HID Mobile Access can be managed from anywhere, without requiring in-person interactions.

Using the integrated reservation system, residents and employees can use their smartphone to conveniently book sports facilities and meeting rooms. At their allotted reservation time, the user simply presents their smartphone or smart watch to the reader by the door to allow them to securely access the space.

Connected and customised mobile access solution

Now, the number of users with HID Mobile Access is nearly six times higher than with the previous key tag method. Furthermore, by eliminating physical tags and text-based entry codes, the municipality has realised a 15-20% savings per user, as it no longer needs to replace lost tags, physically maintain older systems, or pay to send codes to facility users by text message.

“Before, physical ID passes had been handled using tags. They were widely used, which also allowed for their misuse. The new mobile access solution is connected and tailored solely to the right person, and a significant improvement has taken place,” said Janne Laamanen, the Sports Services Manager for the Municipality of Liminka.

Faster, reliable and secure access control

In addition to significantly improved data security and accuracy, mobile IDs are faster and more reliable than key tags. This has led to a drop in support call volume compared to previous systems.

As one of the first in Finland to utilise mobile access control in its recreational facilities, the Municipality of Liminka’s success with HID Mobile Access has paved the way for other municipalities in the country to consider making the transition. Officials from the surrounding areas have already visited Liminka to experience the solution for themselves.

Easy tracking and access control

“With previous systems, monitoring facility utilisation was a challenge. With HID’s mobile access solution, we can easily track and control access. It’s now possible to make more informed decisions,” said Kari Karjalainen, the Property Manager for the Municipality of Liminka.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Electronic security systems
  • Application security
  • Physical security
  • Perimeter security
  • Public sector security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security access systems
  • Asset tracking
  • Electronic access control
  • Identity management
  • Building security
  • Facility security
  • Public security
  • Wireless security
  • Door access control
  • Security software
  • Physical Security Information Management (PSIM)
  • IP security solutions
  • Security communication
  • Integration software
  • Key management
  • Perimeter protection
  • Cyber security
  • Mobile communications
  • Internet of Things (IoT)
  • Incident Management
  • Security Assessments
  • Cloud security
  • Artificial intelligence (AI)
  • Mobile access
  • Smart Cities
  • Machine Learning
  • Touchless Security
  • Related links
  • HID Access control software
  • HID Access control controllers
  • Access Control Software Access control software
  • Proximity Access control systems & kits
  • Standalone/Networkable Access control controllers
  • Standalone / Networked Access control systems & kits
  • Proximity Access control software
  • Centrally managed access solution Access control software
  • ID Badging Software License Access control software
  • Issuance and identification system Access control software
  • Management Systems Upgrade Access control software
  • Related categories
  • Access control controllers
  • Access control systems & kits
  • Access control software
Related white papers
The 2024 state of physical access trend report

The 2024 state of physical access trend report

Download
The truth behind 9 mobile access myths

The truth behind 9 mobile access myths

Download
6 good reasons to embrace mobile credentialing

6 good reasons to embrace mobile credentialing

Download
Related articles
City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID Global hails the renewed promise of mobile access

HID Global hails the renewed promise of mobile access

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Government & Public Services
About this page

"Municipality of Liminka in Finland deploys HID Mobile Access solution" is one of 9201 in-depth security application and installation case studies featured in this section. Visit regularly for the latest updates on use cases, installations and deployments of security products from HID, Schneider Electric Limited, Seniortek, Asio.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec