Do you know where your smartphone is right now? Of course, you do. If not, you’re probably searching for it frantically by now. The only thing worse than losing your keys might be losing your smartphone.

We’re all highly aware of the whereabouts of our mobile devices (considering that sometimes they’re strapped to our bodies). And that’s why mobile access control makes complete sense. With mobile access control, your credentials are housed in your mobile device—enabling access to secured business facilities and resources—mobile access security.

Mobile access control strengthens an organisation’s security since nobody shares their device privacy with anybody else. People use their phones to access bank accounts, email, private messages, and other sensitive accounts. Storing digital “keys” to access physical spaces is just as secure—and the benefits go even further. The potential is great, and the possibilities are endless, when it comes to mobile access.


Considering 92.3 percent of internet users access the internet via their mobile device (e.g. iPhone, Apple Watch), it’s no secret that our mobile devices have become an essential part of doing business and keeping in touch with the world. Following the wave of innovation, it’s only natural that adoption of mobile access control is on the rise.

So, let’s answer the top 5 questions about mobile access security.


1. What makes access control secure in the first place?

Modern access must successfully ensure both the physical and digital aspects of security. In today’s world, these realms increasingly overlap. Hackers may try to break into physical spaces or to perform cyber-attacks. Or they attempt to breach systems to impact physical security and safety.

Most high-quality physical access control systems are, by necessity, IT systems that leverage technology to keep locations secure. For example, with mobile access control, mobile passes can be granted, withdrawn, and tracked from a security officer’s centralised command centre. And any unauthorised access sets off an immediate alert. One can quickly see the parallels between protecting digital and physical assets.

Therefore, all access control must be cyberattack resistant. For example, end-to-end encryption, strong authentication, and regular software updates are essential to keep networks and buildings safe and secure.

2. What are other factors in mobile access control security?

We already mentioned some of the fundamentals of mobile access security, but there’s more…

For example, with mobile access control, there’s no more badge-sharing. Who’s going to lend someone their smartphone to enter a restricted building?

Mobile passes are protected by the privacy and security features of your mobile device which are typically state-of-the-art. To activate a mobile device in the first place, it requires PIN, password, or biometric access which provide a solid first line of defence.

Don’t worry, your device provider cannot see credentials stored securely in the mobile device, just like they can’t access your bank account info. Also, device providers can’t see the spaces or resources you access (nor can they see when you access them).

Unlike keys or plastic badges, you can add additional biometric identification (e.g. Face and Touch ID) and Two Factor Authentication (2FA) to mobile access. This is especially useful in places that require the highest level of security such as at government, military, corporate, or critical infrastructure sites.



3. What is the security risk if a device gets lost or stolen?

Mobile passes can be suspended, resumed, or removed remotely in the case of a lost or stolen device. So even if a device falls into the wrong hands, it can’t be used to enter a restricted building or area.

If your mobile device is misplaced or lost, your mobile pass will be automatically suspended once the device is marked as “Lost” in your “Find My” application. Your mobile pass will only be reactivated when your device is recovered and verified by you.

If, for any reason, the device is not recovered, fresh credentials can be provided to a new device. Meanwhile, the lost device’s credentials are deactivated permanently.


4. Can mobile passes be transferred to another device?

No. As a built-in security feature, mobile passes cannot be copied, transferred, re-issued, or re-used on another device. And mobile passes are essentially hack-proof. Mobile access authorisation is unique, encrypted, and highly secure.

This unique identification also can be invaluable in the event of an emergency. Think about an evacuation scenario. You want to be sure that everyone has safely exited the building. Mobile technology can be used to verify that everyone is out of harm’s way which optimises rescue efforts. Security officers operating mobile technology can have complete visibility of movement on site. This allows them to mark credential holders as safe, and anybody who might be missing can be identified.


5. Is mobile access control more secure than physical plastic badges?

Mobile access control is significantly more secure than plastic badges. As we mentioned earlier, mobile access control eliminates the risk of badge-sharing. Unlike badges, mobile access can also leverage advanced security methods such as biometric tools and Two Factor Authentication.

Stored with the latest industry standards and with the security features of the devices, you can rest assured they’ll be updated whenever you need. Plus, there’s no “eavesdropping” because the technology is based on NFC. This means we can rely on the MiFare DESFire protocol and security measures automatically built into this standard for communication (not to mention security features already built into Apple devices).


Mobile access control means stronger security

Consider scenarios where hundreds if not thousands of people require access to multiple areas, such as at large corporate or university campuses. Maybe in your organisation?

Knowing who goes where and when can be a huge challenge, which makes it a significant security risk. But it doesn’t have to be.

Mobile access control solves many of the problems associated with keeping organisations safe and secure. It elevates access management to the next level with unparalleled agility, flexibility, and security. Keeping track of building access—and keeping your facilities secure—has never been easier.



Ask us anything


More news