Download PDF version Contact company

Farpointe Data, the access control industry's OEM for RFID credentials and readers, announced that end-users, dealers, integrators and system providers can assess how easy it is to convert from card access control to mobile access control though a quick trial provided by Farpointe Data. By simply clicking on a link or accepting a bar code via their smart phone, individuals can obtain a free mobile credential.

Access control systems

"What implementers will quickly find when moving from card to smartphone-based access credentials is that many legacy access control systems require the use of back-end portal accounts," explains Scott Lindley, Farpointe Data general manager. "However, newer solutions provide an easier way to distribute credentials with features that allow the user to register their handset only once and need no other portal accounts, activation features or hidden fees."

Sensitive end-user data

For hackers, these portal accounts have become rich, easy to access caches of sensitive end-user data. These older mobile systems also force the user to register themselves and their integrators for every application. The bookkeeping alone can be confusing. For instance, who signs you up, hidden fees, who is in charge of security and who is ultimately responsible can all be questions left unanswered.

"Today, all that should be needed to activate the new mobile credentials system is the phone number of the smart phone," emphasises Lindley.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?