Moving to mobile

Access & Identity Management Handbook 2021 Access Control & Identity Management

Mobile access control has shown good growth over the past few years, albeit from a small base. Omdia made a comment in 2019 that while growth of mobile-based access would continue, the primary market for this technology is new installations. Apparently, a mass migration from cards/fobs to mobile is not on the cards, but many newer installations are taking advantage of the benefits of access control via the user’s mobile device.

Of course, when referring to using mobile devices for access control, we include the residential (or consumer) market as well as the commercial and enterprise market as there are many solutions available for smaller and home installations. The question is, are South African consumers and organisations making the move to mobile access? If they are, what are their options and can they make the move gradually without a massive replacement project that would cost a fortune?

Wouter du Toit, regional director, Salto Systems Africa says digitalisation and new technologies are transforming the world, including the access control market. “We continue to get requests for mobile credentials in Africa. Mostly, NFC/BLE (near-field communications/Bluetooth Low Energy) projects are new installations. With Salto’s new generation of BLUEnet hardware, BLE/NFC is built into the technology by default, making it future proof for any client to convert to mobile in the future if they are not ready to implement it immediately.”

Hayley Elwen, business development director, Africa at ASSA ABLOY agrees, noting that many companies using standard readers are now requesting mobile credentials. “We have found around 15% of sites are now asking for mobile credentials compared to traditional systems. With Wi-Fi already installed in many buildings, mobile access makes for an easy conversion and saves long-term costs on lost physical credentials.

“Another advantage we see for building owners is that with ASSA ABLOY’s SMARTair solution with Openow, you no longer require hubs. The software loaded onto the server connects directly to the mobile phone and SMARTair’s wireless door locks. Not only does this make for a more cost effective solution, but means a simple no-fuss installation, which is appealing in existing buildings wanting to upgrade from keys to an access control solution.”

Pros and cons

As with almost everything in the world related to technology today, one of the questions around mobile credentials is whether employees will be happy to load an app on their smartphones, an app their company controls. Some could even ask what other information the app might share without the user’s knowledge.

Most mobile smartphones have a number of secure features to protect your data and the phone, such as password, PIN and even biometric authentication, making it very secure even if lost or stolen, according to Du Toit. Moreover, he adds that Salto does not ask for any information when the user downloads the application. “We are also GDPR compliant to enforce our stance on people’s privacy. Where we do collect data, we acknowledge it and it is shared with us willingly.”

Elwen echoes this and adds that flat batteries and data connectivity are also concerns to some. However, she says that as data has become more affordable and accessible, this is less of a concern. In addition, in an emergency, flat batteries can be managed by card override functionality on many devices. There again, the majority of users will be disinclined to allow their batteries to run flat and be out of communications except in unusual circumstances.

As far as the benefits of mobile access are concerned, Du Toit continues: “Assigning and revoking access has never been easier and convenient without sacrificing security; gone are the days that a card must be encoded and then distributed to a user in person, with mobile technology it is done on the go. This makes it a lot simpler for remote workers to get access on the go. There is no need to be in contact with the user when assigning access as you can send new or updated credentials OTA (over the air).

“It makes multi-site management easier for the operator and more user friendly for users. It can be used with wired, wireless and battery-operated standalone solutions. It also transforms offline readers into semi-online devices. In areas where a networked reader is not possible nor needed, the phone becomes the carrier to the server with OTA services and it can update the blacklisting on the device and also retrieve the battery status and transaction log. This creates a very cost-effective solution in terms of issuing credentials.”


Moreover, the company can also easily cancel a user’s access when they leave or when a smartphone is lost or stolen with the click of a button.

Facility managers get through their access management workload much faster when they replace traditional card or tag credentials with mobile credentials, notes Elwen. Because solutions like Openow and the SMARTair TS1000 software handle everything, delays in issuing or revoking keys for sensitive doors no longer jeopardise site security or company efficiency.

“Essentially, there are no physical credentials to handle or track, no card encoders to buy and no queues at reception for staff or visitors awaiting credentials being issued. And of course, mobile credentials provide a more sustainable offering – no plastic cards being manufactured or lost,” she continues.

Looking at the hotel industry, Elwen mentions that mobile access offers a simpler way to provide multiple credentials for one room. Should a family be staying together, it is easy to generate mobile credentials for all those staying in a specific hotel room, with no potential loss of cards and the costs associated with that. “And of course, there is no manual check-in required. Within 24 hours, you do a mobile check-in and access is sent directly to the guest’s phone. Upon arrival, the guest simply presents their phone to the room door lock to get in – easy and convenient.”

A secure ecosystem

Further to the security question, Du Toit points out that Salto is certified according to the Secure Digital Applications Kitemark Certification for the organisation’s JustIN app and web services. According to the BSI, the BSI Kitemark certification “independently tests websites or apps to make sure they have the security controls in place for the information they are handling. It requires a website or app to undergo rigorous and independent testing.” (Read more at www.bsigroup.com)

“This provides further reassurance to Salto customers that its entire access control ecosystem has the appropriate security controls in place,” he states.

Similarly, Elwen says ASSA ABLOY’s mobile solutions use end-to-end encryption to protect communications between the phone and the server to ensure users are protected. Mobile phones also have additional layers of security against physical credentials: a screen-lock adds an extra layer of security. Additionally, with phones, multi-factor authentication is baked into the credential.

“And how quickly would you notice if a plastic keycard went missing? Nowhere near as fast as you’d spot your smartphone was gone,” she notes.


Salto’s solutions

In describing his company’s solutions, Du Toit says Salto is continuously improving its hardware and software solutions and part of this development always includes mobile credential and functionality with convenience and security.

“Our main on-premise access control solution, Salto ProAccess Space, uses JustIN Mobile as a carrier option for Android and iOS. This solution also ties back to our hospitality solutions using the same JustIN Mobile application.”

SaltoKS is a cloud-based access control and hospitality solution with mobile credential support. This solution features more than just opening the door; users are also able to interact from the mobile device, managing certain aspects of the solution. Danalock cloud-based residential and SME solutions also feature a mobile offering for management and interaction with the door opening.

“Gantner recently became part of the Salto family and adds a host of mobile solutions that tie into locker management, T&A; and ticketing solutions,” he concludes.

ASSA ABLOY’s solutions

Elwen says ASSA ABLOY provides two different mobile access control offerings to suit a range of applications. One is the Openow mobile functionality offered with the SMARTair commercial and hospitality access control solution, and the other is the range of Aperio locks offered with SEOS mobile credentials, which integrate into most access control systems.

SMARTair Openow: SMARTair is a full access control system using wireless door locks and hubs. It offers various levels of access control management in a single wireless system. With different offerings geared at commercial and hospitality installations, it provides flexibility for the end user, with easier installation.

Openow is the mobile solution for SMARTair wireless locking systems. Users store their validated digital keys securely in the Openow app. To open a SMARTair lock, they simply tap their phone against its inbuilt RFID reader. An encrypted (HTTPS/AES-128) Bluetooth connection connects the phone and locking device to quickly validate or deny an unlock request.

Aperio with SEOS mobile credentials: SEOS is the next generation of credential technology that provides the ideal mix of security and flexibility for any organisation. It is an advanced encryption and software-based infrastructure; it secures trusted identities on any form factor and can be extended for applications beyond physical access control. This solution integrates with existing infrastructure and is secure, portable and adaptable to multiple applications.


Benefits of mobile access - By Wouter du Toit, Salto.

• Increased flexibility and improved security. Easy, efficient and intuitive automated key delivery to create a keyless experience.

• Proven mobile and secure technology to create a keyless experience anytime, from anywhere and on any device.

• Send or receive a secure key to open any door. Issue, cancel, and restrict keys to specific times and locations.


Credit(s)






Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Mines require proof of performance
Technews Publishing Mining (Industry)
The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment.

Read more...
From the Editor's Desk: Something old and something new
Technews Publishing News & Events
      Welcome to the 2024 edition of SMART Security Solutions’ Mining Handbook. Mining is a challenging industry for security professionals, although security is a challenge on this continent, no matter your ...

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Entries to southern Africa OSPA Awards now open
Technews Publishing Securex South Africa Editor's Choice News & Events
The southern Africa OSPAs are part of a global awards scheme that recognises and rewards teams, individuals and organisations for their commitment and outstanding performance within the security sector.

Read more...
Securex has moved to June
Technews Publishing Editor's Choice News & Events
Following the formal announcement of the date for South Africa’s national election, 29 May 2024 , which happened to be in the middle of the planned dates for Securex South Africa, Securex will now take place from 11 – 13 June 2024 at Gallagher Estate in Midrand.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...