Mobile Access explained

April 2015 Access Control & Identity Management

HID Global recently launched its Mobile Access technology that allows companies to grant access to employees using their smartphone as an access card. HID Global’s Robbie Truter, area sales manager for sub-Saharan Africa, answers some questions on Mobile Access.

How will HID Global’s recently launched HID Mobile Access solution change the way we open doors?

Truter: HID Global’s, HID Mobile Access solution supports Bluetooth Smart and NFC to open doors and gates with smartphones, tablets and other mobile devices, while enabling the future use of these devices for a wide range of additional applications. Powered by Seos technology, the solution provides superior identity management and also enables users to open doors and gates from a distance via Bluetooth Smart and HID Global’s “Twist and Go” gesture technology.

To elaborate further on this, firstly, it allows staff to use any smart device instead of an access card to enter a building. Secondly, staff can open doors similarly to how they use a card, by tapping the phone to the reader – but they can also open doors from a distance of up to 2 metres via Bluetooth Smart and Twist and Go gesture technology. This is particularly useful in parking garages or warehouses, where one cannot easily get close to the readers. Many of our beta users provided positive feedback for using this for the front door of their building. Each door can be configured to allow for either a short range frequency or a long range Twist and Go gesture, so each customer can set up their environment to what is suitable for their organisation.

Why is HID Global’s offering unique?

Truter: HID Global’s Mobile Access offering is the industry’s most comprehensive, end-to-end commercial solution that supports both Bluetooth Smart and NFC, without the need for additional accessories. HID Global has also created a unique and highly intuitive deployment and management experience with its user-friendly HID Secure Identity Service portal.

Administrators simply send users an invitation to download an HID Mobile Access app directly to their Bluetooth or NFC-enabled phones. After download and registration of the app, Mobile IDs can be immediately issued, provisioned or revoked over the air. The portal is designed for administrator convenience and efficiency, and allows administrators to manage individual or a batch of users for speedy provisioning and ongoing management.

After the Mobile ID has been issued, the user can open a door or gate by either tapping their handset to a mobile-enabled reader or, using their Bluetooth connection and HID Global gesture technology, simply rotate the device to initiate the transaction as they drive or walk up to it.

For more information contact HID Global, +27 (0)82 449 9398, [email protected], www.hidglobal.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...