What Are The Obstacles To Adoption Of Mobile Credentials For Access Control?
Editor Introduction
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
Mobile credentials are making a big push now in the market as companies look for ways to harness existing technology that we carry every day: our mobile phones. This is especially appealing as organizations strive to appeal to a younger generation by implementing advanced technology to address common challenges of access control management. One of the obstacles mobile credentials have seen, however, is the need to download an application on a device that is personally owned for a work application. Another consideration is how to handle visitors and contractors that might require short- or long-term access. Privacy concerns also dominate mobile credential discussions, and recent regulations in Europe with GDPR can create concern with how information is gathered and shared on a mobile device. While there is certainly momentum for these types of credentials in the market, considerations need to be made to address these concerns.
According to the IHS Access Control Intelligence Database - Mobile Credentials report, 20 percent of all credentials will be mobile by 2020, a significant increase compared to today. This is expected to be the fastest growing category in the access control market. Mobile credentials have been slow to take off because legacy readers traditionally did not have Bluetooth or NFC capacity. However, upgrade kits will soon be available from some access control vendors, and customers will be able to easily upgrade their readers. We are already seeing a steep increase in the adoption of mobile readers. In fact, already most of reader sales in the projects we are involved with are mobile-enabled, as our customers see the value in future-proofing their installations. The early adopters are schools, who are implementing totally mobile-enabled access control systems, and enterprise customers, who tend to use mobile credentials as a complement to existing readers.
The greatest obstacle to largescale adoption of mobile credentialing in the access control industry is probably not a technological hurdle but a hardware one, which can lead to a lack of willingness to adopt new system designs. Many access control systems are not brand new and, in turn, use legacy technology that does not support readers capable of handling mobile credentials. For access control systems to adopt this new approach, there needs to be a way for users to transfer data from one system to another. With older technology, that may not be possible without replacing the system in its entirety. For small scale applications, such as a business with few doors, the upgrade is easier. On the other hand, if an enterprise has hundreds of doors and thousands of users, the needed investment is huge.
The credential as we know it is already dead, but the industry hasn’t realized it yet. Mobile Credentials will be one of the key drivers in a paradigm shift for access control. We’re still in the early phases of the shift where most people are trying to use the “new technology,” i.e. a smartphone, to do what the old technology did (badge at a door), rather than leveraging what is now possible to deliver a new, better experience. For example, there’s really no reason to have to present a smart phone to a reader, ultimately the access control installation of the future won’t have readers at the door, and it will be so much more than simple badging.
Mobile devices are quickly replacing everyday items in our daily lives. From tablets to laptops – and now, wallets, keys and light switches – replacing RFID tags with NFC technologies on mobile devices is overdue. Employees treat these devices as an extension of themselves. Once the phone is the proverbial key for the building, it provides a conduit for additional safety and security functions like panic buttons, emergency notifications, and the potential for real time location tracking in the event of an emergency. Employees, especially with personally owned devices, are becoming more and more privacy-conscious; while the pluses of deploying mobile credentials are obvious to the organization, selling the benefits to the employee can be an uphill battle. Including additional functions like Panic Buttons and Emergency Notifications with any mobile solution in the workplace can help an organization increase adoption with mobile credentials, all while showing a commitment to workplace safety.
The commercial sector is likely to see the largest growth rate over the next few years for two main reasons. First, typical offices have a limited number of access-controlled doors so the cost of upgrading to mobile capable readers is relatively inexpensive. Second, with company-issued smart phones becoming more common, bringing them under the administration of the organization’s IT security policies reduces overall risk. For Government organizations, adoption of mobile credentials is held back due to a lack of a universally accepted standard. Additionally, many agencies have internal badging policies that require visual identification, making it less likely they will pay for a mobile license as well as issue cards. A further obstacle is the large cost of re-credentialing an entire workforce. You can add to this the challenge of integrating mobile credential management and distribution into existing IT platforms and accounting for phone OS updates, patches, device upgrades etc.
Gartner has forecasted that 20 percent of organizations will use smartphones rather than traditional physical access cards by 2020. We think this is a conservative estimate as we already see many universities, co-working spaces and other early adopters moving completely to “mobile-only” access-control system models. These users place a high value on the ability to integrate numerous applications into a unified mobile experience. Other trends likely to accelerate the adoption of mobile credentials include rising interest in cloud-based access control platforms that can potentially enable even more services and experiences on mobile phones. For facility managers, these platforms will support flexible and convenient subscription models to make it easier to replenish mobile IDs when smartphones get lost or need replacement. Mobile IDs also help move from product-based models to an easier, service-based experience for deploying access control credentials, while streamlining forecasting, budgeting and reporting at the same time.
There is little doubt that mobile credentials will be the preferred form of digital identity within the next decade. While the mobile credential likely will never fully replace alternate forms of identification, our fast-paced society has shown an inclination toward technologies that drive efficiencies in our daily lives. Once end users experience the advantages of mobile credentialing – such as enabling unencumbered movement through spaces where the access system recognizes the user’s presence and reacts to individual preferences such as office lighting and temperature settings – the shift will happen. This migration toward mobile credentials is happening in the hospitality industry. Where available, end users avoid lines by checking in via mobile phone and heading directly to their room upon arrival. We anticipate that the adoption of the technology in this mainstream segment will help drive its broader acceptance, soon making mobile credentials as commonplace as fingerprint identification on mobile phones.
Editor Summary
Systems that are simpler to install and can be deployed rapidly. Lower cost and more efficient operation. Expanding capabilities. These are just a few of the benefits of cloud-based systems pointed out by our Expert Roundtable Panelists. Cloud-based systems are even changing the way security systems are configured and sold: They are a major factor in the industry transition to a recurring monthly revenue (RMR) model. Best of all, the cloud is helping to expand the capabilities of systems and providing additional useable data that yields greater value to end user customers. It’s no wonder you hear so much about the cloud in the physical security market.
- Related companies
- Genetec, Inc.
- 3xLOGIC, Inc.
- ONVIF
- IHS Markit
- ACRE, LLC
- Rave Mobile Safety
- The Ava Group
- Related categories
- Access control software
- Access control readers
- View all news from
- Genetec, Inc.
- 3xLOGIC, Inc.
- ONVIF
- IHS Markit
- ACRE, LLC
- Rave Mobile Safety
- The Ava Group
Expert commentary
Security beat
Security bytes
- Getting To Know Dan Grimm, VP And General Manager Of Computer Vision At RealNetworks
- Big Wins And The Importance Of Showing Up: Insights From SecurityInformed.com Editor Larry Anderson
- Setting Goals, Business Travels And Radioactivity: Success Secrets From Tiandy's John Van Den Elzen
- Getting To Know Jeff Burgess, President/CEO At BCDVideo
Mobile access articles
Zenitel, a provider of intelligent communication solutions, announced the launch of two new door entry intercoms: the Turbine Extended Intercoms TEIV1+ and the TEIV4+. The new products display Zenite...
Physical security is essential for a modern production facility, users don’t want just anyone entering the building or accessing secure areas. But what about production machinery? Machine authe...
trinamiX, a provider of biometric solutions, showcases their invisible integration of secure Face Authentication into a foldable screen for smartphones. The solution is integrated behind OLED and off...
Codelocks (Australia) Pty Ltd, an access control company that designs and distributes innovative, standalone keyless door locks, is celebrating ten years of providing leading-edge mechanical and elect...
Gunnebo Entrance Control has reaffirmed its commitment to sustainability, with a bold ambition to achieve net zero emissions by 2045. Grounded in the principles of employee empowerment, ethical busin...
IDEMIA Secure Transactions (IST), a division of IDEMIA Group, is a provider of payment and connectivity solutions for financial institutions, mobile network operators, and automotive manufacturers. B...
Global security manufacturer, Gallagher Security, has announced that support for employee badges in Apple Wallet is available for Gallagher customers in the U.S. with the release of Gallagher Command...
Barracuda Networks, Inc., a trusted partner and major provider of cloud-first security solutions, announced that Neal Bradbury has been elevated to the role of Chief Product Officer. In this new role...
Genetec Inc., a renowned technology provider of unified security, public safety, operations, and business intelligence solutions, announced that its new enterprise-grade SaaS solution, Security Center...
Gallagher Security announced the latest release of their award-winning security site management software, Command Center v9.10, marking a significant evolution for the security platform trusted to pro...
Gunnebo Entrance Control has announced its acquisition of DG Concept and Diadem, a French entrance control, design, installation, and service specialist, marking a significant step in reinforcing its...
Global technology solutions provider - Arrow Electronics, Inc. (ARW) announced that Broadcom selected it as the sole provider for its CloudHealth from VMware offering. CloudHealth is designed to help...
In an industry-first, Safetrust provisions employee and visitor badges directly into Apple Wallet via an email link or text message, eliminating the need to download an application. This innovative a...
HID, a worldwide pioneer in trusted identity solutions, announces the availability of its new HID Seos Essential Bundle, providing small to mid-size businesses (SMBs) in Europe with the benefits of ad...
Compatibility with a range of credential technologies can be a critical factor when selecting access control. As organizations across the world explore a move to mobile keys for access, it is more imp...
5 Surprising Findings From OT Vulnerability Assessments
DownloadMulti-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadFacial Recognition
DownloadVerkada TD52 Cloud-Based Video Intercom
exacqVision IP08-64T-R1XW-E X-Series 1U Rdnt IP NVR 64TB RAID5 Windows OS with 8 IP Ent Lic
Climax Technology TouchPanel-3 7” Color Graphic Touchscreen Panel