Mobile access credentials

April 2017 Access Control & Identity Management, IT infrastructure

In 2016, less than 5% of organisations used smartphones to enable access to offices and other premises. By 2020, Gartner says 20% of organisations will use smartphones in place of traditional physical access cards.

“A significant fraction of organisations use legacy physical access technologies that are proprietary, closed systems and have limited ability to integrate with IT infrastructure,” said David Anthony Mahdi, research director at Gartner. “Today, the increasing availability of mobile and Cloud technologies from many physical access control system (PACS) vendors will have major impacts on how these systems can be implemented and managed.”

PACS technology is widely deployed across multiple vertical industries and geographies to secure access to a wide range of facilities (buildings, individual offices, data centres, plant rooms, warehouses and so on), ensuring that only entitled people (employees, contractors, visitors, and maintenance staff) get access to specific locations.

Mobile technology is already widely used for logical access control. Phone-as-a-token authentication methods continue to be the preferred choice in the majority of new and refreshed token deployments as an alternative to traditional one-time password (OTP) hardware tokens. Gartner projects that the same kinds of cost and user experience (UX) benefits will drive increasing use of smartphones in place of discrete physical access cards.

Smartphones using technologies and protocols such as Bluetooth, Bluetooth LE, and Near Field Communication can work with a number of readers and PACS technology.

One of the easiest ways to use a smartphone’s access credentials is to integrate them – via a data channel over the air or via Wi-Fi – into the access control system (ACS) and ‘unlock the door’ remotely (just as an ACS administrator can). This approach requires no change to reader hardware.

Using smartphones can also simplify the integration of biometric technologies. “Rather than having to add biometric capture devices in or alongside readers, the phone itself can easily be used as a capture device for face or voice (or both), with comparison and matching done locally on the phone or centrally,” said Mahdi. “This approach also mitigates the risks from an attacker who gains possession of a person’s phone.”

The technology’s limitations remain a challenge. For example, there’s significant disparity in functionality between smartphones, and some security and risk management leaders should be aware that their physical card readers and PACS might require a significant upgrade to use smartphones for physical access. “Nevertheless, replacing traditional physical access cards with smartphones enables widely sought-after cost reductions and UX benefits,” said Mahdi. “We recommend that security and risk managers work closely with physical security teams to carefully evaluate the UX and total cost of ownership benefits of using access credentials on smartphones to replace existing physical cards.”

For more information contact Gartner Africa, +27 (0)21 790 3526.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising Maslow’s Hierarchy of Needs
October 2019 , Integrated Solutions, IT infrastructure
Mobile technology has the potential to change how Africa approaches patient and healthcare, says Phathizwe Malinga, managing director, SqwidNet.

Read more...
A platform approach to innovation and value
CCTV Handbook 2019, Technews Publishing , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
Moving to the platform model of doing business holds tremendous advantages for end users and smaller developers, but also for the whole technology supply chain.

Read more...
Selecting the right surveillance storage
CCTV Handbook 2019, Capsule Technologies, Technews Publishing , Editor's Choice, CCTV, Surveillance & Remote Monitoring, IT infrastructure
Storage is an integral part of a surveillance installation and the solution chosen can make or break the success of your project.

Read more...
The NUUO storage solution
CCTV Handbook 2019, Forbatt SA , CCTV, Surveillance & Remote Monitoring, IT infrastructure
A stable NVR should maintain a consistent data throughput unaffected by user actions such as querying or playback.

Read more...
Keeping your things to yourself
October 2019, Technews Publishing , Editor's Choice, Cyber Security, Integrated Solutions, IT infrastructure
Three experts spoke to Hi-Tech Security Solutions to offer advice on keeping your IoT working for you and not for cyber criminals.

Read more...
IoT in security
October 2019, Duxbury Networking, Technews Publishing , Editor's Choice, Cyber Security, Integrated Solutions, IT infrastructure
Using the Internet of Things is not really optional these days, but securing the Internet of Things is compulsory, no matter what industry you operate in.

Read more...
Enhanced biometric technology for mines
September 2019, ZKTeco , Mining (Industry), Access Control & Identity Management
Biometric identification and authentication are currently used at various mines in South Africa and in the SADC region.

Read more...
Improving access in mines
October 2019, Astra Fasteners , Mining (Industry), Access Control & Identity Management, Products
The VP1 controller provides full access control and remote monitoring of intelligent locks without having to wire into a network or install, manage and maintain software.

Read more...
Invixium and Pyro-Tech partner in South Africa
October 2019 , News, Access Control & Identity Management
Invixium, a manufacturer of IP-based biometric solutions and Pyro-Tech Security Suppliers have announced a new distribution partnership.

Read more...
Suprema receives FBI PIV/FAP30 certification
October 2019, Suprema , News, Access Control & Identity Management
Suprema has announced that the company's BioMini Slim 3 has received FBI PIV (Personal Identity Verification) and Mobile ID FAP30 certification.

Read more...