Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Leadership and ManagementSecurity & Business ResilienceAccess ManagementIdentity ManagementPhysical SecurityConstruction, Real Estate, Property Management

How access control is fueling change in our physical spaces

By Steve Van Till
Fingerprint access control
November 26, 2021

Historically, access control has been based on guards, guns and keys. The primary purpose was to prevent things from happening — keep a bad guy from getting into the bank vault, a corporate spy accessing sensitive documents, a hacker getting into a server room or more.

Today, the entire philosophy of access control has changed. It is not about prohibiting the negative anymore, but instead about enabling fluid movement through spaces. With the growing digital transformation of physical spaces, access is now the ultimate enabler of letting people into spaces to make a business thrive, and it represents our first line of defense in protecting tenants’ health and safety in the fight against COVID-19.

Access control facilitates safe and hybrid work environments and the flexibility that both employers and employees are looking for in the workplace.

Access control can create safe and hybrid work environments 

The transformation of the hybrid work model has completely turned commercial real estate on its head. To keep up with demands that are changing faster than the spaces themselves, cloud-based access control is the standard for enabling the office and commercial spaces for the post-COVID-19 era.

From the employer perspective, today’s corporate leaders are looking for a way back to the office. Research shows that 45% of companies expect to lead with a hybrid workforce model in the second half of 2021, and 32% indicated an “in-person first” employment model, according to a CNBC study. Based on this data, 77% of companies could be actively seeking solutions that will allow their employees to safely return to the office. To achieve this, access control becomes a foundational platform to help people access space in this new office environment.

Let’s talk safety. It’s impossible to discuss the return to work without factoring in tools that enable social distancing and occupancy limits.

Occupancy management as an access control element includes the ability to manage the total number of people on-site, including how many people are allowed within spaces inside the total office, such as office suites, conference rooms and other collaborative spaces. As more companies implement vaccine mandates, occupancy management also supports not only who should be allowed on-site, but also how many people are in a room at one time. And tools that support vaccine mandates are a critical need right now. Fifty-two percent of companies plan to have vaccine mandates by the end of the year, according to a Willis Towers Watson survey that polled 1,000 companies employing almost 10 million people.

Access control technology facilitates workplace optimization for employees by giving them a way to request the specific days they would like to be in the office, as well as the office stations and meeting rooms they require when on-site. While access control of the past included only provisioning into the main doorway, today’s access control includes the provisioning of all spaces, including desk booking and room reservations. Without access control connected to these types of systems, managing a hybrid or hoteling-type environment is nearly impossible. Visitor management is also imperative in the hybrid environment to know who enters in the event of mandatory contact tracing.

Lastly, for employers of large enterprises, cloud-based access control becomes critical when an organization has multiple locations. As each location reopens with varying hybrid models, the ability to manage every location and their specific needs all from the same place, and remotely, is imperative to ensure offices can run again.

The future of commercial real estate is flexibility 

Intelligent access control technology provides a better tenant experience. In 2021, when 85% of the population owns a smartphone, it is safe to say that we are a mobile-first society. Mobile credentials allow tenants to utilize the smart devices they have on them at all times to provision access to where they want to go. From the garage through the main door to suite access, mobile access control creates a frictionless flow and improved tenant user experience.

Access control technology also provides the commercial real estate owner with more options for utilizing their property. Some property owners are adapting downsizing and available square footage in their buildings as a result of COVID-19 and the work shift. These adaptations include opening up more flex space or repurposing space into co-working areas, in which they can monetize their asset and take advantage of the new hybrid work model. To do this, however, access control is critical to managing these spaces and fully monetizing time and space used.

Access control data analytics powering space optimizations

Cloud-based access control has completely revolutionized data analytics for physical security by digitizing the collection, storage and management of each action collected. Knowing how your tenants access and use physical space helps you to make better decisions about how to optimize your physical footprint — you can’t manage what you can’t measure.

This level of detailed and granular data on people, places, things, video and events all together is a treasure trove of information that can be utilized for understanding micro and macro trends. On a micro level, the use of this data gives you a holistic view of how spaces are being used, who is using those spaces and where there are opportunities for efficiencies.

In the previously presented workplace optimization example, access control provides employees with the flexibility to book the days they want to return while simultaneously providing employers with a way to track how many people are wanting to return on a daily, weekly and monthly basis. The use of this data, when combined with organizations across the country, supports the tracking of macro trends over time, such as the status of the national return in a post-COVID-19 world.

In terms of physical safety, access control data makes security easier and more effective. The advanced analytics capabilities in cloud-based access control data sets help security teams weed through the thousands of actions that occur in a day and prioritize abnormal and risky activity to have faster response times to the activities that require additional attention.

Access control is enabling the future we want to see

It wasn’t that long ago that physical security was seen as an area that would be “nice” to update, but was not a priority for organizations. Today, that could not be further from the truth. The pandemic has completely reshaped working conditions and consumers’ and corporate health and safety concerns. The answer? Improved technology to support physical distancing and more granular access provisioning.

Security will always be about keeping people safe and ensuring assets are protected. But we need to evolve our thinking around access control just being used to badge in and out of a space. Access control is the foundation of a smart building tech stack that allows people the frictionless experience to welcome them back to the office.

KEYWORDS: access control cloud-based access control data analytics hybrid workforce mobile credentials occupancy detection work from home

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Untitled 1
Steve Van Till is the Founder, President and CEO of Brivo, the global leader in cloud-based physical access control and Software-as-a-Service solutions. He has previously served in a variety of senior management roles in high technology companies spanning Web development, healthcare, and satellite communications. A Board Member of the Security Industry Association (SIA), he also currently serves as Chairman of the SIA Standards Committee. He is a frequent author and speaker, as well as the inventor of numerous patents. Steve has been honored by Security Magazine as one of “The Top 25 Most Influential People in the Security Industry.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Big Data

    How Will Big Data Change Security?

    See More
  • data feat

    How Will Big Data Change Security?

    See More
  • money_enews

    How Security Can Use Big Data Best

    See More

Related Products

See More Products
  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!