Smartphones offer a new alternative to traditional physical access control form factors such as smart cards or fobs. Convenience is the most obvious benefit, but there are others. Here are some advantages of using smart devices for access control:

1. Less vulnerability to cloning when compared to magstripe or low-frequency proximity cards. Digital credentials and mobile IDs are securely stored and protected.

2. Longer-distance communication, which allows readers to be mounted on the safe side of a door.

3. Less likely to be stolen or shared – everyone keeps up with their smartphone!

4. Easier revocation of access rights remotely in case a mobile device is compromised.

5. Greater support for multi-factor authentication -- and more security.

Leveraging mobile devices for access control

Considering more than 500 million smartphones were sold in 2014, the opportunity is huge to leverage these devices for use in physical and logical access control systems. Using mobile devices to control physical access is the obvious next step for both employees and enterprises. To fully realise the opportunity, enterprises need to understand the technologies and how they can be implemented for physical and logical security applications.

Driven largely by convenience and operational efficiency, enterprises are increasingly seeking to leverage the full potential of a mobile-first world. Understanding the technology – and the opportunities it presents – is the first step. Convenience is only the beginning.

A new white paper from HID Global provides a useful overview of what enterprises and their employees need to know about the potential of mobile access control.

Click Here to Download the White Paper Now!

Download PDF version Download PDF version

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?