Moving to mobile

Access & Identity Management Handbook 2021 Access Control & Identity Management

Mobile access control has shown good growth over the past few years, albeit from a small base. Omdia made a comment in 2019 that while growth of mobile-based access would continue, the primary market for this technology is new installations. Apparently, a mass migration from cards/fobs to mobile is not on the cards, but many newer installations are taking advantage of the benefits of access control via the user’s mobile device.

Of course, when referring to using mobile devices for access control, we include the residential (or consumer) market as well as the commercial and enterprise market as there are many solutions available for smaller and home installations. The question is, are South African consumers and organisations making the move to mobile access? If they are, what are their options and can they make the move gradually without a massive replacement project that would cost a fortune?

Wouter du Toit, regional director, Salto Systems Africa says digitalisation and new technologies are transforming the world, including the access control market. “We continue to get requests for mobile credentials in Africa. Mostly, NFC/BLE (near-field communications/Bluetooth Low Energy) projects are new installations. With Salto’s new generation of BLUEnet hardware, BLE/NFC is built into the technology by default, making it future proof for any client to convert to mobile in the future if they are not ready to implement it immediately.”

Hayley Elwen, business development director, Africa at ASSA ABLOY agrees, noting that many companies using standard readers are now requesting mobile credentials. “We have found around 15% of sites are now asking for mobile credentials compared to traditional systems. With Wi-Fi already installed in many buildings, mobile access makes for an easy conversion and saves long-term costs on lost physical credentials.

“Another advantage we see for building owners is that with ASSA ABLOY’s SMARTair solution with Openow, you no longer require hubs. The software loaded onto the server connects directly to the mobile phone and SMARTair’s wireless door locks. Not only does this make for a more cost effective solution, but means a simple no-fuss installation, which is appealing in existing buildings wanting to upgrade from keys to an access control solution.”

Pros and cons

As with almost everything in the world related to technology today, one of the questions around mobile credentials is whether employees will be happy to load an app on their smartphones, an app their company controls. Some could even ask what other information the app might share without the user’s knowledge.

Most mobile smartphones have a number of secure features to protect your data and the phone, such as password, PIN and even biometric authentication, making it very secure even if lost or stolen, according to Du Toit. Moreover, he adds that Salto does not ask for any information when the user downloads the application. “We are also GDPR compliant to enforce our stance on people’s privacy. Where we do collect data, we acknowledge it and it is shared with us willingly.”

Elwen echoes this and adds that flat batteries and data connectivity are also concerns to some. However, she says that as data has become more affordable and accessible, this is less of a concern. In addition, in an emergency, flat batteries can be managed by card override functionality on many devices. There again, the majority of users will be disinclined to allow their batteries to run flat and be out of communications except in unusual circumstances.

As far as the benefits of mobile access are concerned, Du Toit continues: “Assigning and revoking access has never been easier and convenient without sacrificing security; gone are the days that a card must be encoded and then distributed to a user in person, with mobile technology it is done on the go. This makes it a lot simpler for remote workers to get access on the go. There is no need to be in contact with the user when assigning access as you can send new or updated credentials OTA (over the air).

“It makes multi-site management easier for the operator and more user friendly for users. It can be used with wired, wireless and battery-operated standalone solutions. It also transforms offline readers into semi-online devices. In areas where a networked reader is not possible nor needed, the phone becomes the carrier to the server with OTA services and it can update the blacklisting on the device and also retrieve the battery status and transaction log. This creates a very cost-effective solution in terms of issuing credentials.”

Moreover, the company can also easily cancel a user’s access when they leave or when a smartphone is lost or stolen with the click of a button.

Facility managers get through their access management workload much faster when they replace traditional card or tag credentials with mobile credentials, notes Elwen. Because solutions like Openow and the SMARTair TS1000 software handle everything, delays in issuing or revoking keys for sensitive doors no longer jeopardise site security or company efficiency.

“Essentially, there are no physical credentials to handle or track, no card encoders to buy and no queues at reception for staff or visitors awaiting credentials being issued. And of course, mobile credentials provide a more sustainable offering – no plastic cards being manufactured or lost,” she continues.

Looking at the hotel industry, Elwen mentions that mobile access offers a simpler way to provide multiple credentials for one room. Should a family be staying together, it is easy to generate mobile credentials for all those staying in a specific hotel room, with no potential loss of cards and the costs associated with that. “And of course, there is no manual check-in required. Within 24 hours, you do a mobile check-in and access is sent directly to the guest’s phone. Upon arrival, the guest simply presents their phone to the room door lock to get in – easy and convenient.”

A secure ecosystem

Further to the security question, Du Toit points out that Salto is certified according to the Secure Digital Applications Kitemark Certification for the organisation’s JustIN app and web services. According to the BSI, the BSI Kitemark certification “independently tests websites or apps to make sure they have the security controls in place for the information they are handling. It requires a website or app to undergo rigorous and independent testing.” (Read more at

“This provides further reassurance to Salto customers that its entire access control ecosystem has the appropriate security controls in place,” he states.

Similarly, Elwen says ASSA ABLOY’s mobile solutions use end-to-end encryption to protect communications between the phone and the server to ensure users are protected. Mobile phones also have additional layers of security against physical credentials: a screen-lock adds an extra layer of security. Additionally, with phones, multi-factor authentication is baked into the credential.

“And how quickly would you notice if a plastic keycard went missing? Nowhere near as fast as you’d spot your smartphone was gone,” she notes.

Salto’s solutions

In describing his company’s solutions, Du Toit says Salto is continuously improving its hardware and software solutions and part of this development always includes mobile credential and functionality with convenience and security.

“Our main on-premise access control solution, Salto ProAccess Space, uses JustIN Mobile as a carrier option for Android and iOS. This solution also ties back to our hospitality solutions using the same JustIN Mobile application.”

SaltoKS is a cloud-based access control and hospitality solution with mobile credential support. This solution features more than just opening the door; users are also able to interact from the mobile device, managing certain aspects of the solution. Danalock cloud-based residential and SME solutions also feature a mobile offering for management and interaction with the door opening.

“Gantner recently became part of the Salto family and adds a host of mobile solutions that tie into locker management, T&A; and ticketing solutions,” he concludes.

ASSA ABLOY’s solutions

Elwen says ASSA ABLOY provides two different mobile access control offerings to suit a range of applications. One is the Openow mobile functionality offered with the SMARTair commercial and hospitality access control solution, and the other is the range of Aperio locks offered with SEOS mobile credentials, which integrate into most access control systems.

SMARTair Openow: SMARTair is a full access control system using wireless door locks and hubs. It offers various levels of access control management in a single wireless system. With different offerings geared at commercial and hospitality installations, it provides flexibility for the end user, with easier installation.

Openow is the mobile solution for SMARTair wireless locking systems. Users store their validated digital keys securely in the Openow app. To open a SMARTair lock, they simply tap their phone against its inbuilt RFID reader. An encrypted (HTTPS/AES-128) Bluetooth connection connects the phone and locking device to quickly validate or deny an unlock request.

Aperio with SEOS mobile credentials: SEOS is the next generation of credential technology that provides the ideal mix of security and flexibility for any organisation. It is an advanced encryption and software-based infrastructure; it secures trusted identities on any form factor and can be extended for applications beyond physical access control. This solution integrates with existing infrastructure and is secure, portable and adaptable to multiple applications.

Benefits of mobile access - By Wouter du Toit, Salto.

• Increased flexibility and improved security. Easy, efficient and intuitive automated key delivery to create a keyless experience.

• Proven mobile and secure technology to create a keyless experience anytime, from anywhere and on any device.

• Send or receive a secure key to open any door. Issue, cancel, and restrict keys to specific times and locations.


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Is the smoke beginning to clear for password security?
Access Control & Identity Management Security Services & Risk Management
The password problem is the result of bad habits, and they can be hard to break. But ask anyone that has done it and they will not tire of telling you the benefits.

Solving coworking front-desk drama
Access Control & Identity Management Products
Flexible, shared and coworking offices have taken off with great success, but because occupational churn is high, the front-desk can be a difficult place to manage.

Are you your insider threat?
Technews Publishing Editor's Choice Security Services & Risk Management Commercial (Industry)
Insider threats are a critical aspect of risk management today, but what happens when it is the owner of the company acting fraudulently and making sure none of his staff can catch him?

Powder coating provides durable finish
Turnstar Systems Access Control & Identity Management Industrial (Industry)
Turnstar’s powder coating line provides corrosion resistance, high-quality surface finishing and a long-term environment-friendly impact for all access control components the company manufactures.

Passion, drive and hard work
Technews Publishing Editor's Choice CCTV, Surveillance & Remote Monitoring Security Services & Risk Management
Colleen Glaeser is a leader in the security market, having made her mark in the male-dominated security industry through determination and hard work, along with a vision of making the world a safer place.

System integrators and surveillance
Technews Publishing Stallion Security G4S Secure Solutions SA Integrated Solutions
Hi-Tech Security Solutions asked two system integrators if they are seeing an upturn in the market and if projects are back on track despite the economic slowdown and supply chain chaos?

Leaning into the edge
Technews Publishing Axis Communications SA Forbatt SA Hikvision South Africa Editor's Choice CCTV, Surveillance & Remote Monitoring Integrated Solutions IT infrastructure
Video storage and analytical processing, with the help of artificial intelligence on the edge, is simple today with the powerful and advanced camera technology we have available.

From the editor's desk: The last CCTV Handbook
Technews Publishing News
Welcome to the CCTV Handbook 2022, I hope the headline caught your eye. This really is the last CCTV Handbook Hi-Tech Security Solutions will ever produce, but it is not the last handbook about surveillance ...

Tracking surveillance into the future
Technews Publishing Bosch Building Technologies Cathexis Technologies Axis Communications SA Arteco Global G4S Secure Solutions SA Editor's Choice CCTV, Surveillance & Remote Monitoring Integrated Solutions
Hi-Tech Security Solutions asked six industry experts to join us around a table to discuss the state of the surveillance industry and where it is going.

Supply chain woes
Masc Solutions Technews Publishing CCTV, Surveillance & Remote Monitoring
Hi-Tech Security Solutions asks Mark Kane from Masc Solutions about the supply chain issues the industry has been facing for far too long.