Safety in work and education

Issue 4 2020 Access Control & Identity Management

South Africa and the world are faced with a pandemic which has turned our lives upside down. Living our ‘normal’ daily lives is no longer possible, and even with an easing of the lockdown in South Africa we cannot conduct business as usual. The virus has impacted our homes, our workplaces, hospitals and educational institutions. As employers, employees, residents, students, we all need to change our lifestyle habits, be more cautious of what we do, where we go and importantly, what we touch.

As we return to work, we need to balance our need for security with our need to care for our health. With the avoidance of touch-based systems, and to increase on-site hygiene, biometric security systems are being disabled to enable a return to work for some businesses, and there are hesitations even around the card and tag approach to access control systems. However, there are solutions that will allow high levels of security, with a ‘no-touch’ approach to security. It even enables biometrics in certain circumstances. Mobile phone access systems may be the solution to balance all a business’ needs.

Introducing mobile phone access products encourages safe and good hygiene practice in the workplace, while still ensuring high-security access management.

Most employees now use smartphones, and with biometric identification loaded on most of the new models, a secondary security element of fingerprint identification allows that next level of security while still simply waving your phone to gain access.

What is mobile access?

Mobile access technology uses an existing mobile device and integrates with the safety access software for better security and access. Not only is it cost-effective as it integrates with existing smartphones, it is also simple as it makes the process easier for the user, minimising the risk factors of coming into contact with any surface that might be contagious.

How can we integrate it to our environment?

Access products such as ASSA ABLOY’S SMARTair access control system offers the Openow app, software that replaces keys and smartcards with secure credentials stored on a user’s phone. It is a system that integrates easily with existing systems through your phone. All site users need is their smartphone and the Openow app to unlock any SMARTair device. Users don’t need to collect a credential, it arrives automatically inside the validated app on their smartphone, exactly when the facility manager decides. Users can protect their Openow app with a PIN, and even store keys for multiple sites in a single app. Every user’s app automatically sends event reports back to the SMARTair system.

Facility managers send, revoke and update virtual keys over the air from anywhere, using the SMARTair TS1000 software. Your business replaces smartcards, tags, keys and other physical credentials altogether. Everything else works exactly the same.

If we look at solutions for educational environments, which have high traffic, multiple buildings and doors, (and therefore relatively high hygiene risk), the HID Mobile Access Campus solution is tailormade for campuses. It enables new levels of user experience through One Digital Identity. HID’s Mobile Access Campus solution provides students and faculty with one seamless digital identity that can be conveniently utilised across multiple scenarios, all through the mobile device.

The solution improves physical access control: End-users are no longer required to carry a physical card to securely access building facilities – they can instead supplement or replace their card with their mobile device. Payment authentication can be incorporated, with students and faculty using their phone or tablet to authenticate payment for dining areas, canteens and cafeterias. Libraries and rentals are managed via the mobile identity for checking out books, CDs, and DVDs. It even manages mobile ticketing with users able to enter sporting events, concerts, and lectures thanks to mobile ticketing capabilities offered by HID Mobile Access.

By authenticating one connected, digital credential, colleges and universities can greatly enhance the overall user experience, all while creating a more modern, professional and innovative impression.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.