Mobile credentials taking off

SMART Access & Identity 2025 Access Control & Identity Management

Mobile access via smartphones is becoming more common, with use cases ranging from Bluetooth, NFC (Near-Field Communication), or QR codes to manage secure access to commercial and personal locations. Mobile access offers convenience for registered users, while also making it simpler and easier for visitors, temporary workers, or delivery personnel. However, privacy, the loss of full control of identity data and user buy-in are potential challenges.

On the other hand, cloud management’s benefits make it appealing to many, allowing centralised management and real-time monitoring, which is ideal for environments with multiple entry points. It further provides for data collection and analysis, which can be helpful for building and people management, as well as the broader security function.

The 2024 IFSEC/HID State of Physical Access Control Report states, “While physical ID is still prevalent within the access control industry, there is no doubt that mobile access credentials and digital IDs are fast gaining ground.”

It further states that about 39% of respondents to the annual report “actively use mobile identities,” and they believe touchless/contactless solutions (48%) and mobile access (44%) are the two most significant trends shaping the access control industry. The report also expects almost 80% of organisations to deploy mobile IDs within the next five years.

“The advantages of flexibility, cost saving, improved hygiene and privacy have made the technology widely accepted by end users,” according to a report from Ivy Sun, Senior Analyst at Omdia. “Access control vendors have cited mobile credentials as the dominant trend influencing the market. The advantages of flexibility, cost saving, improved hygiene and privacy have made the technology widely accepted by end users.”

Furthermore, the company predicts that revenues from mobile credential sales will grow at 39,8% CAGR between 2022 and 2027. With these positive sentiments in mind, SMART Security Solutions asked two industry players for their thoughts on the state of mobile access and how they see it changing over the coming year.

Growing acceptance and rollout

Werner Geldenhuys, Paxton’s Country Sales Manager for South Africa, says that the use of mobile devices for access control has grown in popularity. “At Paxton, we offer users the option to use their phone or smartwatch as a key to access doors for free with Paxton10. This is available via the Paxton Key app. According to our records, there were over 19,000 downloads of the Paxton Key app in South Africa over the past three years, demonstrating that people are open to using mobiles for access control.”


Werner Geldenhuys

The reason for the interest, according to Geldenhuys, is that compared to traditional access cards or tokens, people almost always carry their phones on them, meaning it is one less thing to carry around. In addition, many people use biometrics on their phones to increase the security of personal data or documents saved on the device. “So, if a user loses their phone, technology like the Paxton Key app adds a layer of security and prevents unauthorised people from accessing the building.”

This leads to another benefit of using smart devices as keys; saving on the costs of buying access cards or replacing keys and locks if lost.

In a recent case study with Beau Vie II, the benefits and convenience of using the Paxton Key app for both the building manager and users was showcased. Beau Vie II is a student apartment block located at Banghoek Road, Cape Town. To secure the apartment, they use Paxton’s access control and video management system, Paxton10, alongside Paxton10 cameras and video door entry solution.

Morné Mellet, Technical Systems Specialist at Remote Entry Systems, installed and now manages the system for the customer. He said, “The smart credential is a major plus point for the client and the residents. At first, all the residents used the traditional keyfobs, but then, they requested the smart credentials one by one after seeing other people using their phones instead. Currently, about 90% of the residents are only using their phones as keys.”

Andre Vermeulen, GM of Secutel Technologies, adds, “While mobile access is steadily growing, adoption has varied across industries. Some sectors embrace it fully due to its convenience and security, while others implement it selectively, often citing compatibility or infrastructure concerns.

“With solutions like NoKey, we have observed a shift toward mobile adoption, especially in environments prioritising remote management and enhanced security. Our platform’s ability to integrate seamlessly with existing systems supports this trend, offering convenience without compromising control.”

Privacy issues and user buy-in

With the growing focus on personal privacy and increased regulatory scrutiny, some users may have issues with ‘company software’ on their phones. While this may not be a real risk (assuming one uses reliable brands’ apps), it still worries some people.

“User resistance to company apps often stems from concerns about privacy and compatibility,” says Vermeulen. “At Secutel, we mitigate this by emphasising the NoKey app’s secure and user-friendly nature, which does not interfere with personal data. Educational initiatives like training sessions or quick-start guides can help users feel more confident. Highlighting key features like end-to-end encryption and biometric authentication also reassures users about safety and simplicity.”

Geldenhuys explains that this is not necessary. “Paxton’s smart credentials do not gather any information from the user or the device. They only transmit a unique identifier to the Paxton10 system that is compared against a database of users to determine if a user has access.”

In addition, while passwords are still the primary means of accessing digital assets, the surge in cyberthreats pushes many to look for additional access control solutions to secure electronic resources and increase overall security. Vermeulen says integrating digital and physical access is feasible today and is increasingly in demand.

“Solutions like NoKey already allow users to unlock physical doors and remote management via smartphone apps. With built-in biometric and PIN authentication, NoKey bridges physical and logical access by ensuring only authorised personnel can operate in sensitive areas. For instance, integration with systems like Visual Verifier can restrict digital access unless users are physically present at a site, enhancing security comprehensively.”

Threats to and from the user

One of the debates around using personal devices for mobile access is the safety of mobile credentials. Smartphones are not only used for gaining access, but users can do almost anything with them, using apps that may be from unreliable sources. The threat of infecting one’s phone with some form of malware is real, and the question must be asked whether some breach of a personal device could impact the mobile credential, the associated app, or be transferred to the corporate network.

Vermeulen does not see this as a significant threat. “Smartphones used for access control, like with NoKey, are safeguarded by layers of encryption and a secure app architecture. The malware risks are minimised by using end-to-end encryption and hosting all data on a secure cloud platform. Additionally, biometric authentication ensures unauthorised access remains unlikely even if a phone is compromised. Regular app updates and strong IT policies can further enhance security.”

Built-in biometrics

Taking security further, a mobile credential is secured on a user’s smartphone, meaning there can be an additional layer of protection – multi-factor authentication (MFA) – which ensures the user is who they claim by requiring them to unlock their phone. Since smartphone fingerprint and facial biometrics are much more reliable today, verifying your identity with your mobile is an added MFA layer (even if a PIN is used), and the identification data stays on the user’s device, avoiding any privacy pitfalls.

According to Geldenhuys, system administrators can identify critical areas for a building and require Paxton Key users to unlock their phones before being granted access. Access will be denied if a user does not unlock their device or cannot unlock it. This security requirement can also be implemented site-wide. It will come at a significant cost saving as the end user will benefit from biometrics by simply utilising their mobile devices.

Vermeulen agrees, noting that organisations increasingly leverage device biometrics as an added layer of security. “With NoKey, smartphone biometric authentication is seamlessly integrated, ensuring only the authorised user can access facilities.”

QR codes are also used for access control, especially visitor management. However, we have recently seen criminals corrupting QR codes for nefarious purposes. This raises the question of risks to both the user and the company implementing access control. Vermeulen notes that while QR codes are still used in some scenarios (such as residential estates), BLE (Bluetooth Low Energy) is a more secure and efficient alternative, offering extended range and robust encryption to mitigate tampering risks.

Solutions in the market

Finally, SMART Security Solutions asked what products and solutions regarding mobile access solutions Paxton and Secutel have released over the past year, and what we can expect to see in the near future.

Geldenhuys says the company launched the brand-new Paxton Entry app in October 2024 as a new entry for the Paxton video door entry system. “The Paxton Entry app allows users to answer video calls from a Paxton Entry panel and open the door from anywhere in the world at any time. The app offers users the convenience of being freed from a specific computer or monitor, allowing them to answer and manage visitor access, while away from their desk.”

He adds that the Paxton Entry app has received positive feedback:

• Pete Harrop from Origin Solutions said, “The Paxton Entry app provides a very useful feature, enabling reception to answer calls from the Entry panel while away from their desk.”

• Peter Gale from Cohort Security Solutions said, “It is very simple and intuitive. It is straightforward, easy to set up and easy to navigate.”

In the past year, Vermeulen states that Secutel has advanced mobile access control through NoKey, featuring:

• Secure mobile credentials with biometric and PIN authentication.

• Seamless integration with security and camera systems like Visual Verifier.

• Remote management and event logging via the NoKey.io Cloud platform.

“Looking ahead, we aim to enhance compatibility, expand integrations, and explore AI-driven analytics for predictive security measures. Offline access features and real-time activity monitoring will remain core focuses as we continue prioritising convenience, efficiency, and security for our clients.”


Credit(s)







Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...
Inside the RealScan SG10
neaMetrics Access Control & Identity Management Products & Solutions
The SG10 was optimised for speed at every stage, from capture to processing. The result is faster fingerprint acquisition and near-instant response for operators.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.