The Next Big Step

The Next Big Step

Of all the megatrends being discussed within the security industry right now—from IoT to the Cloud to edge analytics— there is one technology among them that is most likely to have an immediate impact on the way businesses and facilities of all sizes operate: mobile credentials.

Individuals have found that their phones and other smart devices can be used in their own homes to operate locks, and—along with the push for more IoT-enabled devices at work in general—they have come to expect the same level of sophistication and convenience at work.

But traditionally in the business realm, mobile credentials for access control were used only by the largest of enterprises. This was due to the ability of large corporations to issue company-controlled devices to employees while also allowing a credentialing systems administrator to manage both the software and hardware. Or, in some cases, corporations planned and managed an effective BYOD (bring your own device) policy. Still, the cost of the system and the training required to use it served as barriers to entry to all but the most sophisticated systems administrators.

But the landscape has changed. As this demand increases through home use of these technologies, the learning curve to train individuals on mobile applications has become far less demanding.

Further, the cost of implementation has fallen sharply in recent years. With mobile credentials becoming more dynamic and consumable, we’re starting to see the technology trickle down from those large enterprises into the rest of the market. The instances of mobile- supported product and device solutions have also increased substantially, making the deployment and use of the credentials more attractive and impactful to businesses. Because of this trickle-down use in large enterprise and the expectation of use in the home, the pressure to adapt to the technology is now being felt on both sides to adopt to the new normal. The expectation for mobile applications for credentials among employees, residents, students, contractors, and visitors will drive security in the coming years from what has traditionally been hardware-based access control, to a new way of doing business.

New Ways of Doing Business with Mobile Apps

Mobile credentialing has the potential to improve overall business operations by allowing businesses and facilities to manage their workforce more efficiently with the process they use to distribute credentials. Physical key systems are extremely cumbersome to manage properly. Physical keys are difficult to distribute and track, and if lost, can result in an unsecured building or the added cost and difficulty of rekeying doors. In addition, there is no audit trail or way to know who accessed what.

By moving to a digital credentialing system, enterprise customers can utilize visitor management systems, offer expiring keys to contracted employees, and manager their own workforce through personal and company devices.

For universities, these benefits are largely the same. Credentials are offered to individuals via a mobile application and can be set to expire at the end of a semester. This also provides a much more secure solution, since college students are far less likely to part with their smart phones than they are to pass off their campus ID or key card to let someone else into their residence hall. They are also far less likely to misplace or forget their smart phones, reducing lockouts and the need to issue new cards.

There is a further increase in efficiency gained by sending a credential over an encrypted connection to a secure element in the user’s phone or mobile device. This is an improvement to having individuals report to an office that may potentially be offsite. For businesses or campuses that have multiple locations across a city, state or the country, the ability to leverage credentialing in this way is an incredible timesaver for both the facility management staff and the credentialed user.

Plan Ahead for These New Expectations

So, while there are both business benefits and customer demand driving the use of mobile applications for facility security, there is also a practical plan that enterprises can employ to ramp up to providing the technology: install door and opening hardware that works with current credentials and mobile applications.

By implementing and installing mobile-ready hardware for access control that works with multiple credential types, the owner of a facility can serve their existing access and identity management methodology while also planning for the future.

ASSA ABLOY addresses this need by offering a wide range of access control locks that support a wide range of credential types and HID Mobile Access. HID Mobile Access leverages Seos as the underlying credential technology to offer the freedom of using your device of choice—from smart cards to smart phones—for secure access to more applications. It also provides the confidence of best-inclass security and privacy protection.

By installing door and opening hardware that uses Seos, security professionals can blend traditional systems with new mobile applications and mobile credentialing.

With hardware ready for this potential change, the ability to move toward mobile credentials is as simple as introducing the application to users.

Practical Next Steps

For any new building, or any upgrade or retrofit, security decisions need to start with the credential. In the past, that meant deciding between the use of legacy hardware, such as mechanical locks and keys, or using new electronic access control components.

Today, that means implementing a solution that can be futureproofed to prepare for the demand of mobile credentialing through a mobile application. Even if you aren’t prepared to move to the system now, the planning to provide that in the future can begin today.

For integrators and engineers, that decision needs to be made with the owners, facility managers and network administrators all in one room. Many mobile-ready locks are IP-enabled and use existing network infrastructure to connect to the access control system. IP-enabled locks have a minimal impact on the network, making the ability to integrate a solution much less daunting than many imagine. This can be explained at the start of the project when a credentialing decision is being made, offering the opportunity to future-proof the system.

The bottom line is that the expectation of end-users to use mobile security applications as mobile credentials is here. And the ability to meet those expectations is available. But if you aren’t prepared to make the leap immediately then good planning, and future-proofing your hardware, means you won’t be left behind when the expectation for mobile applications becomes the new normal.

This article originally appeared in the October 2017 issue of Security Today.

Featured

  • 2025 Gun Violence Statistics Show Signs of Progress

    Omnilert, a national leader in AI-powered safety and emergency communications, has released its 2025 Gun Violence Statistics, along with a new interactive infographic examining national and school-related gun violence trends. In 2025, the U.S. recorded 38,762 gun-violence deaths, highlighting the continued importance of prevention, early detection, and coordinated response. Read Now

  • Big Brand Tire & Service Rolls Out Interface Virtual Perimeter Guard

    Interface Systems, a managed service provider delivering remote video monitoring, commercial security systems, business intelligence, and network services for multi-location enterprises, today announced that Big Brand Tire & Service, one of the nation’s fastest-growing independent tire and automotive service providers, has eliminated costly overnight break-ins and significantly reduced trespassing and vandalism at a high-risk location. The company achieved these results by deploying Interface Virtual Perimeter Guard, an AI-powered perimeter security solution designed to deter incidents before they occur. Read Now

  • The Evolution of ID Card Printing: Customer Challenges and Solutions

    The landscape of ID card printing is evolving to meet changing customer needs, transitioning from slow, manual processes to smart, on-demand printing solutions that address increasingly complex enrollment workflows. Read Now

  • TSA Awards Rohde & Schwarz Contract for Advanced Airport Screening Ahead of Soccer World Cup 2026

    Rohde & Schwarz, a provider of AI-based millimeter wave screening technology, announced today it has won a multi-million dollar award from TSA to supply its QPS201 AIT security scanners to passenger security screening checkpoints at selected Soccer World Cup 2026 host city airports. Read Now

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.