If the evolving state of the readers and credentials market could be boiled down into a single word, it would probably be “mobile.”
The ubiquity of smartphones in today’s world means that mobile applications for readers and credentials just make more sense for security, sources say.
“Mobile continues to be the dominant trending technology category, and while mobile credential usage as a function of overall credentials in use remains modest, the share is growing rapidly,” says Luc Merredew, product marketing director, physical access control, HID Global, Austin, Texas. “There are few security professionals that are not considering how mobile credentialing can work in their or their customer’s systems. With the launch of mobile credentials in the largest phone operating system provider, many organizations are looking to add credentials to their device wallets. … The end results are truly remarkable customer experiences.” (Merredew is referencing the recent use of contactless access through Apple Wallet by many large enterprises.)
Mobile credentials solutions offer security integrators more flexibility in managing and assisting customers and can help end users reduce costs while creating a safer entry point solution, says Hayes Whitt, commercial security senior global offering manager at Honeywell, Charlotte, N.C.
End users moving from legacy controls like a physical access card to a Bluetooth-based mobile recognitions system can save costs, improve security and enable a better user experience through frictionless credentialing and entry, he says.
Pictured is LenelS2’s BlueDiamond Bluetooth mobile credential solution, which is available in both a standard “per credential, per year” offering, and an unlimited credential model. // IMAGE COURTESY OF LENELS2
Remote access also helps increase efficiencies. For instance, security dealers and integrators can often remotely resolve issues in less time, decreasing the number of physical trips needed to a particular site, Whitt adds.
The push toward deploying credentials on mobile devices is especially prevalent in higher education and many commercial enterprises, says Angelo Faenza, head of digital access solutions at ASSA ABLOY Opening Solutions Americas, New Haven, Conn. “Almost everyone has a smartphone today, and students are among the most active users of mobile apps and wallets for transactions of all kinds, from making purchases securely to getting into places safely,” he says. U.S. colleges and universities are installing thousands of electronic access control (EAC) locks for new construction and to retrofit classic campus buildings — and many are either already using mobile credentials or ready for the transition, he says.
And because ripping and replacing legacy readers is not always cost effective or productive, new technology allows building owners to update their existing physical access systems and install intelligent mobile access solutions with minimal hardware upgrade requirements, Whitt notes. “This helps to not only upgrade to a modern, contactless building experience but also helps provide better analytics and user management capabilities, while managing the cost of upgrades.”
Richard Sedivy, director of marketing and regulatory affairs at Doorking (DKS), Inglewood, Calif., says, “Mobile credentials are certainly becoming preferable for access system users. Everyone wants their smartphone to be an all-in-one package to control everything.”
Jeffrey Jachetta, head of sales and customer success at Key Security Designs, an integrator based in Danville, Calif., agrees. “End users are overwhelmingly requesting readers that can support mobile credentials as they have become accustomed to all other things they control via their phones,” he says. “It used to be a suggestion as a ‘nice-to-have’ upgrade, which the reseller would persuade the end user to opt for. However, the feature request is now frequently being initiated by the end user as a ‘must-have.’”
The COVID-19 Connection
Like many other trends in the electronic security industry, the move toward mobile readers and credentials was accelerated by the global pandemic, when mobile credentials helped reduce physical interaction with the badging office and security team during quarantine. The use of contactless access and thermal screening technology rose dramatically during the pandemic, which carries over into today’s post-pandemic era, says Jack Barker-Davy, product manager at Paxton Access, Columbia, S.C. “For example, we launched features to our access control solution Net2, including occupancy management and checkpoint control,” he says. “We also introduced thermal camera integration. These features are enabled through the use of readers and credentials, allowing contactless access.”
Today, mobile credentials help streamline enrollment and support a hybrid or primarily a work-from-home environment, says Rachael Ratliff, director, national accounts at AMAG Technology, Torrance, Calif. “Setup is done remotely, saving time and eliminating the hassle of replacing lost, stolen or forgotten cards,” she says. “Mobile credentials are convenient and cost effective.”
Customers today also trust mobile app-based credentials more than in the past, which helps increase demand. “There used to be much more hesitancy in shifting to mobile credentials due to cybersecurity and privacy concerns, whereas it is now generally accepted that they are safer and more secure than traditional cards,” Jachetta says.
Because technology continues to evolve, access control systems must be easy to install and navigate. // IMAGE COURTESY OF PAXTON
Quite simply, mobile credentials offer more security than conventional reader and credential systems, says Brach Bengtzen, director of marketing at ProdataKey (PDK), Draper, Utah. “People may share their PIN codes and let coworkers borrow their access card, but nobody is going to share or lose their phone,” he says. “Twenty-five percent of credentials are lost every year, and after two to three years, cards usually break and need to be replaced. Those hassles and associated expenses are virtually eliminated with mobile credentials.”
In industry verticals like the commercial real estate market, COVID-19 and an overall focus on the tenant experience have increased the adoption of Bluetooth and other hands-free options for access control, says Louis Boulgarides, CPP, president and CEO of Ollivier Corporation, an integrator based in Los Angeles.
And now that businesses are welcoming workers back into the office, more are gravitating toward the use of mobile credentials, says Mike Green, senior manager, digital product management at LenelS2, Framingham, Mass. “These customers would like to enable their employees to use their devices, such as a mobile phone, to gain access into workplaces,” he says. “Often, they won’t even have to remove their phone from their pocket or bag; they can simply walk up to the reader and the secure credential automatically sends from their phone based on proximity to the entry point.”
Besides being convenient for users, mobile apps for readers and credentials also provide more security and a cost savings over physical identification cards, Ratliff says. Physical credentials such as cards and fobs can be “expensive, cumbersome and often left at home or lost, which puts the company at risk,” she says. “Employees rarely forget their phone and it’s almost always on their person, therefore it’s more convenient to use. Implementing frictionless technology provides cost savings on cards and is easier to manage.”
Barker-Davy sees more demand for mobile credentials in the access control industry in lieu of physical access tokens. Powered by Bluetooth functionality in smart devices, systems like the Paxton Key app for its access control and video management software Paxton 10 allows users to access through doors with their smartphones and smart watches. “The smart credentials, as we call them, are easy to issue and use, and are completely free of charge,” he adds.
Whether through a mobile app or physical card system, it’s important that integrators explain to their end users the importance of proprietary card technologies and the importance of key ownership. // IMAGE COURTESY OF LENELS2
Enhancing the Customer Experience
The availability of mobile credentials doesn’t mean that more traditional systems are disappearing, however. End users are becoming more sophisticated with their use of “conventional” RFID cards and readers, in large part because of the increased professionalism of integrators, says Merredew of HID. “As an industry, we’ve done a better job than ever before of drawing attention to the shortcomings of legacy technologies while drawing needed attention to the best strategies for designing and deploying systems today,” he says. “For example, the use of customer-specific keysets, managed formats, non-matching card marking and secure reader-to-controller communication such as OSDP v2 secure channel.”
Access credentials are available using smartphone Bluetooth technology, 125KHz proximity cards and tags and 13.56MHz smart cards and tags to allow access through doors, Sedivy says. Wireless radio frequency (RF) devices (transmitters) are still widely used and are often the preferred method for vehicular gate access because they allow users to access the vehicular gate from a greater distance without rolling down the car window.
Integrators are also seeing more demand for open standards such as DESFire in lieu of proprietary card technologies, Green says. “Knowledge around smart card technologies is increasing as customers realize that a downside to the commonly used proximity card technologies is that they are not encrypted and therefore less secure — for example, if they are cloned and replicated, compared to more advanced solutions,” he says.
John Calzaretta, president and CRO of Sentry Enterprises, an integrator based in West Chester, Pa., says that while more enterprises want to move away from proprietary solutions, there is “a continued reluctance within Fortune 500 enterprises to move to mobile or Bluetooth credentials. … A staggering number of enterprises continue to build upon a very vulnerable, 125KHz proximity utilization.”
While most of his customers have migrated to some form of smart cards, many are still using proximity cards, especially in the U.S., says Trevor Stewart, president and co-founder of Security Control Integrators (SCI), Pine Brook, N.J. Before the pandemic, the transition to smart cards was happening more quickly; but supply chain snafus are slowing down the migration, he says.
“Most of our customers are hanging in there with HID readers, even though delivery dates are not certain,” Boulgarides says. “Some people have chosen to move off HID to other products like Open Path, Brivo and other 3mil and Wavelinx readers OEMs by other access control companies.”
Although mobile credentials are growing more popular, card reader systems are still in demand. Pictured is AMAG’s Symmetry access control system with smartcard, although AMAG’s Bluetooth readers also work with Symmetry apps for mobile phone access control. // IMAGE COURTESY OF AMAG TECHNOLOGY
Education Is Key
For integrators who want to enhance their readers and credentials expertise (and sales), sources recommend staying current on the latest technology, offering customers as many options as possible and tailoring them to the end users’ specific needs.
“Now is the time to encourage an alternative to physical credentials and the market is shifting,” says Ratliff of AMAG. “Customers are looking to their integrators to be that subject matter expert and a mobile credential provides convenience, significant ROI, and cutting-edge technology.”
Higher customer expectations and constant advances in door technology mean security integrators need to stay on top of their game if they want to grow and stay relevant, says ASSA ABLOY’s Faenza. “Simply put, integrators who are most knowledgeable about the range of current advancements stand to gain a competitive edge with customers and with attracting and retaining strong employees,” he says.
Part of being that security subject matter expert is the ability to spot vulnerabilities in a customer’s system, says Jachetta of Key Security Designs. “Too often, we see vulnerable prox readers and credentials in use and end users that have little to no understanding of the risks,” he says. “Spending a few minutes to educate the client on best practices and the latest technology goes a long way.”
In light of today’s supply chain challenges, integrators need to be aware not only of market trends, but product availability, says PDK’s Bengtzen. “Be flexible,” he says. “Supply chain issues aren’t going away any time soon. It might be time to explore new ways to deliver on access control projects.”
And because many organizations are handing off the control of physical security to their IT departments, it’s important to understand how these departments work, Calzaretta says. “Learn how to speak the language of IT and look to provide a credential that truly proves the holder’s identity and can be used for multiple use cases: physical security, IT and OT,” he says.
Finally, integrators need to be flexible enough to roll with the punches still being delivered by supply chain issues and changes in emerging technology, Stewart says. “The one piece of advice I’d offer everybody is be flexible and educate yourself on the technology,” he says. “Educate yourself to understand the upsides and downsides to the different technologies available so that when you have to be flexible and find alternative solutions, you don’t make a knee-jerk change and end up with a bigger problem down the road.”