Farpointe Data, the access control industry's OEM for RFID credentials and readers, announced that end-users, dealers, integrators and system providers can assess how easy it is to convert from card access control to mobile access control though a quick trial provided by Farpointe Data. By simply clicking on a link or accepting a bar code via their smart phone, individuals can obtain a free mobile credential.

Access control systems

"What implementers will quickly find when moving from card to smartphone-based access credentials is that many legacy access control systems require the use of back-end portal accounts," explains Scott Lindley, Farpointe Data general manager. "However, newer solutions provide an easier way to distribute credentials with features that allow the user to register their handset only once and need no other portal accounts, activation features or hidden fees."

Sensitive end-user data

For hackers, these portal accounts have become rich, easy to access caches of sensitive end-user data. These older mobile systems also force the user to register themselves and their integrators for every application. The bookkeeping alone can be confusing. For instance, who signs you up, hidden fees, who is in charge of security and who is ultimately responsible can all be questions left unanswered.

"Today, all that should be needed to activate the new mobile credentials system is the phone number of the smart phone," emphasises Lindley.

In case you missed it

Which vertical markets have the greatest growth potential for security?
Which vertical markets have the greatest growth potential for security?

To serve various vertical markets and industries effectively, security professionals must recognise that each sector has unique assets, risks, compliance requirements, and operatio...

Marin Hospital enhances security with eCLIQ access control
Marin Hospital enhances security with eCLIQ access control

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s behind (perimeter) door #1?
What’s behind (perimeter) door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...