Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesAccess Management

Mobile Credentials: Why Should You Adopt Them and What You Need to Know

By Maria Henriquez
mobile
May 1, 2019

According to a report from App Annie, people use nine applications daily, and in a month, they use 30. Why is this relevant? Brivo’s study, “3 Key Drivers to Technology Adoption in Physical Security”, reveals 81 percent of survey respondents are reliant on mobile applications to manage their facilities and people and 62 percent of them are using one to five mobile applications for work. However, only 25 percent have adopted mobile credentials to manage security, revealing opportunities for enterprise security professionals to tap into using mobile applications to improve physical security practices, such as access control, video and alarm management and more. 

Although mobile credentials are in early stages, they are set to take off in the market.  How can they make an impact in your enterprise’s physical security practices? Steve Van Till, President and CEO of Brivo, answers common questions surrounding mobile credentials. 

Mobile Credentials and Their Benefits

“Mobile credentials are a type of digital key stored on a mobile phone. They are used in the security industry to open doors via an electronic access control system,” says Van Till. “There are many benefits of using mobile credentials. For administrators, mobile credentials are easier and less expensive to issue and administer because there is no physical card involved. The entire process of credential issuance can be handled via email, for example.  Users are also much less likely to lose or forget their phone than to lose or forget an access control card, decreasing special requests to the administrator,” he says. 

He notes, “For users, a mobile phone is more convenient than a card because everyone carries a mobile phone already. Some mobile credential apps may also offer additional services, such as security alerts or mustering, to cite two examples.”

How secure are they? “Mobile credentials can be implemented with equal or higher security compared to access control cards. They are much safer than prox cards, for example, and on par with smart cards. Mobile credentials can also be paired with biometric capabilities on the phone to be even more secure than cards alone,” Van Till says. 

In an IBM survey, more than 5,000 C-level executives were asked which technologies will be important in the next three to five years. Their answer? Cloud computing and mobile solutions. Security enterprises can benefit from reduced costs that come with a lower total cost of ownership, advanced situational awareness by using real-time access to manage security and keep people safe when threats arise. One more benefit is improved efficiency when smartphones are used as the key to facilities, as issuing and revoking of credentials can provide added protection since screen unlock pins or biometrics do not require updates to door hardware. 

More paramount, a cloud-based solutions only costs 54-percent less over five years than your average on premise systems, according to Brivo. The cloud offers to make business apps, data storage, communication and management more convenient and cost-effective. Mobile technology is built on the cloud, so when mobile solutions are combined with the effectiveness of cloud computing, it allows for an improved security attack plan when physical threats arise. 

Aside from making the most out of cloud-based operations, mobile credentials can help with mass notification systems, visitor management systems, access management systems and more. 

Challenges Remain 

Although mobile credentials provide many benefits as discussed, challenges remain with using mobile for security, such as how they are integrated with existing IT platforms and OS device updates and a large installed base of legacy readers lacking Bluetooth support or the security app being used on a user’s personal smartphone and privacy concerns. 

Some of the challenges of using mobile for security are due to a large quantity of BYOD employees who are becoming more privacy conscious and are using more business applications. 

Van Till says, “The privacy concerns and protections are very specific to each mobile credential provider and how they have implemented their system.  At one end of the spectrum, they can be completely private with no personal information shared outside the system, and biometrics stored locally in the user’s phone.  At the other end, they might be shared across multiple provider organizations with different levels of security at each point. A self-contained, built-in credential from the access control provider is therefore easier to protect.”

Nonetheless, there is a new trend emerging: the need to integrate mobile credentials to control access. Mobile facilitates the new digital identity, it attracts a mobile-centric younger generation, creates growth of cloud-based systems with mobile experiences and eases updates and replacements. 

KEYWORDS: access control cloud computing services mobile credentials

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security freepik

    Cybersecurity allies: Why you need them and how to find them

    See More
  • SEC0919-Edu2-Feat-slide1_900px

    What Do You Need to Know About the California Consumer Privacy Act?

    See More
  • app-development-freepik.jpg

    Mobile application fraud & abuse: Four things you need to know

    See More

Related Products

See More Products
  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing