Farpointe Data, the access control industry's OEM for RFID credentials and readers, announced that end-users, dealers, integrators and system providers can assess how easy it is to convert from card access control to cellphone access control though a quick trial provided by Farpointe Data. By simply clicking on a link or accepting a bar code via their smart phone, individuals can obtain a free cellphone credential.

Access Control Systems

"What implementers will quickly find when moving from card to smartphone-based access credentials is that many legacy access control systems require the use of back-end portal accounts," explains Scott Lindley, Farpointe Data general manager. "However, newer solutions provide an easier way to distribute credentials with features that allow the user to register their handset only once and need no other portal accounts, activation features or hidden fees."

Sensitive End-User Data

For hackers, these portal accounts have become rich, easy to access caches of sensitive end-user data. These older cellphone systems also force the user to register themselves and their integrators for every application. The bookkeeping alone can be confusing. For instance, who signs you up, hidden fees, who is in charge of security and who is ultimately responsible can all be questions left unanswered.

"Today, all that should be needed to activate the new cellphone credentials system is the phone number of the smart phone," emphasises Lindley.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...