Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business Resilience

Security Strategy

Unlocking innovation: 4 trends in access control technology

As access control technology continues to evolve, security leaders should pay attention to top trends and the opportunities they present.

By Rob Druktenis
Access control technology

JuSun / iStock / Getty Images Plus via Getty Images

July 9, 2024

Access control technology is changing, older systems are being switched out for newer, more accessible systems. More and more, people are asking for all-in-one solutions that incorporate video, audio and analytics. These new, unified solutions are increasingly possible thanks to advancements in system architecture, mobile technology, artificial intelligence and cybersecurity. Here, we discuss four of the biggest trends in access control that security leaders should pay attention to and the opportunities they present.


System architecture

How are cloud and hybrid technologies being applied to access control? What are their advantages and are there any disadvantages?

Before diving into any advantages or disadvantages, it’s important to note that within the security industry, cloud technology is being adopted the fastest in access control. This is because people are more comfortable testing cloud capabilities in access control since it strictly deals with transactional data, versus video which requires greater storage capabilities and carries greater privacy concerns.

As for the pros and cons, cloud solutions offer the advantage of always having access to the latest software features without the need for onsite physical servers. This eliminates the burden on system administrators to frequently update or maintain hardware. However, cloud technologies have yet to be widely adopted for enterprise systems, which often prefer the greater control provided by on-premises servers. Additionally, cloud solutions can be less effective in remote locations or areas with bandwidth constraints.

Hybrid solutions present a cost-effective approach for expanding legacy systems into the cloud while protecting the initial investment in existing hardware. They are also beneficial for adding new sites without the expense of additional hardware. Despite their advantages, integrating hybrid systems can be complex, and ensuring they meet all requirements is crucial. Sometimes hybrid solutions may result in user interfaces not as robust as traditional on-premises systems, potentially limiting some features.


Mobile-first technology

Are access control solutions moving toward mobile technology? If so, why, and what opportunities and challenges does this present?

Access control is experiencing a shift toward mobile technology for two reasons: It is cost-effective for organizations and easier for their users. Additionally, this shift makes temporary credentialling more efficient, since QR codes and Bluetooth credentials can be sent directly to the visitor or contract worker via their phones or emails. These credentials can be set for an allotted time thereby offering more control and improved security. Finally, mobile credentialing can be used across different types of systems, whether on-prem, hybrid or cloud. This movement toward mobile, known as Mobile-First, is an approach toward design that leverages mobile devices as a user’s credentials versus key cards or key fobs.


❝

Cybersecurity risks in access control are not unique and many of the best practices that security leaders apply to other areas can, and should, be applied.”


With this move towards mobile credentialing, there’s still the potential risk that people could share credentials. However, this isn’t unique to this type of solution and is something that good systems can manage. Another potential challenge is that some cardholders may not want to have work related application or credentials on their personal devices. However, this can be easily addressed by issuing them card credentials and having readers that can handle multiple types of credentialing.

Mobile technology presents major opportunities for system management, and it’s growing in popularity. It allows authorized users to more easily add and remove users, assign visitor access, receive alerts and notifications, and even remotely control doors all from their mobile device.


AI and analytics

How are AI and analytics being applied in access control? What are their potential use cases and how can they improve safety?

While the access control is one of the leading areas of security that’s adopting cloud technology, video leads the way with AI and analytics. That’s not to say that AI and analytics aren’t being used in access control, rather it’s being adopted more slowly and in conjunction with video or audio to help create a more secure environment.

For example, by combining video with access control, users are able to determine instances of tailgating, or piggybacking (whereby unauthorized people follow an authorized individual into a secure premise) which is always a vulnerability. Or it can be used to monitor access to sites requiring PPE (personal protective equipment) and restrict entry to anyone not wearing appropriate equipment. Access control analytics can also help monitor and manage instances of occupancy restriction. There are endless possibilities but as with any AI or analytic, the greatest challenge is properly trained models.


Cybersecurity

Are there cyber risks uniquely associated with access control? If so, how can they be mitigated?

Cybersecurity risks in access control are not unique and many of the best practices that security leaders apply to other areas can, and should, be applied. For example, making sure that they are aware of who has access to what spaces and using multi-factor authentication (MFA) are both important steps in protecting credentials and access to an organization’s spaces. Likewise, it’s important that devices on the network and communications are both encrypted, security leaders should be looking at security keys, and standards like OSDP and TPM modules, among other things to make sure every aspect — from door reader to server — is secure.

Legacy access control systems are making way for new, all-in-one systems that are designed to automate and unify the entire system experience for end users. From changing architectures to mobile design, increased use of AI and analytics to greater cybersecurity demands, access control is going to continue evolving with the rest of the security industry. It’s important to be mindful of the latest developments, while always focusing on what is needed out of an organization’s system.

KEYWORDS: access control access management entryway security Security trends

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rob druktenis headshot 2024 crop

Rob Druktenis is Program Manager, Access Control, at Axis Communications. Image courtesy of Druktenis


Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • access card

    Trends & Technology Dictate ‘Smart’ Future for Access Control

    See More
  • Do not enter sign

    New report identifies top 5 trends in physical access control

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing