Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyPhysical SecurityVideo Surveillance

Education & Training

Vertical markets benefit from mobile and cloud access solutions

By George Martinez
person in mask
January 14, 2022

As an enabling technology for physical security, cloud connectivity can improve on-demand availability to software and data. For video surveillance, the cloud can reduce storage and maintenance costs with ready access to live camera feeds and recorded video. In electronic access control deployments, leveraging the cloud can bring flexibility to remote issuance and enable mobile credentials for keyless entry at the edge.  

With cloud-based access control, organizations can expand access with edge-controlled doors and smartphone apps for user access.

Without dependency on a head-end system at the protected premises, smart edge readers with cloud and mobile technologies can reduce hardware and labor costs while simplifying remote management of users with secure access across locations and facilities.

Readers with Bluetooth or Near Field Communications (NFC) can allow security teams to manage and control access to virtually anything, since such readers can operate autonomously with just mobile credentials that function as a user’s digital smart key for day and time scheduled access. Being able to control access to doors, gates and electrified locks or latches with only local power and no need for network connectivity can also simplify keyless entry deployment options.

Though cloud-based solutions offer users easy access to systems and data from virtually any location, including the ability to leverage mobile apps; scalability without much upfront investment in technology; and quick installations because locations do not require an onsite server, there are times when a cloud-based access control system might not make the most sense. Examples could be highly secure facilities, such as data centers, or large-scale enterprise access control customers, such as hospitals who have already made a considerable investment in on-premise servers. In that case, organizations wouldn’t necessarily realize the cost-savings of implementing a cloud solution, since significant on-premise investments have already been made.

However, for organizations in a number of vertical markets, including retail, fitness, multi-tenant and college campuses, the benefits of mobile and cloud-based access control can be significant.

Multifamily Residential and Property Management — Each time a tenant leaves and a new renter moves in, doors need to be rekeyed. This practice also extends to reprogramming cards, fobs or PINs for common areas or front entrances of gated communities. In a location with a high rotation of people, the cost of issuing cards and fobs and managing PINs can escalate quickly, while lost keys increase security risk. Cloud-managed keyless entry can eliminate the need for facility managers to rekey doors or manage lost keys.

Utilities/Telecom Co-Location Spaces — Remote sites, facilities or service closets that reside off corporate-managed real estate locations often rely on physical lock and keys, especially those with no local IT network access. With an electrified lock and intelligent reader paired with mobile cloud technology, remote facilities can leverage single devices that are network-connected to manage user access.

24-Hour Fitness Centers/Gyms/Health Centers — With a fluid and readily-changing membership or visitor base, mobile technology can allow users to access gyms, lockers and other areas with their smartphones. Facility managers can manage and reprogram access remotely.

Universities — By leveraging smartphone-based credentials and wireless locks, a college campus can control, manage and restrict access without magnetic stripe or smart card issuance. Mobile credentials can also provide convenience to a population already using their mobile devices for daily tasks.

Marinas and RV Parks — With the goal of restricting access to high-value assets, users at these types of properties can log into the cloud for record-keeping reports of access and can also revoke or reinstate access permissions remotely.

Standalone Kiosks and Shop-and-Go Retail — Similar to the Amazon Go concept, another emerging application for cloud-managed mobile access is unattended retail locations, which can be found in shopping malls or within an existing building, such as an airport. These kiosks and shop-and-go retailers can allow users to make purchases and pickups without an attendant present. Access to a pickup locker can automatically be revoked after a package has been retrieved.

For vertical markets that can deploy mobile access and cloud-based access control, such deployments reduce hardware and network dependencies on premises and present opportunities for security and facility managers to manage access remotely as well as deploy access at the edge in individual, remote or changing locations.

As the pace of innovation accelerates, smart edge technology for access control applications will continue to improve with additional capabilities, including leveraging analytics and artificial intelligence already available through the cloud.

KEYWORDS: enterprise security risk management security analytics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Martinez

George Martinez is the Director of Product Management of OpenBlue Security & Innovation cloud initiatives for Johnson Controls. Over the past seven years with Johnson Controls, Martinez has held senior product management roles. Prior to Johnson Controls, Martinez brought more than 20 years of physical security market experience and served in senior roles for brands such as Mace Security Products, GE Security, Interlogix and CASI-RUSCO. Bio image courtesy of George Martinez, JCI

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • smart access control system

    How enterprise security leaders can benefit from access control in coworking spaces

    See More
  • dormakaba access control

    The enhanced role of touch-free and mobile access solutions drive a new normal

    See More
  • smarphone

    Reporting and Administrating: Manage Physical Access Control from Mobile Devices

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Optimizing Social Media from a B2B Perspective

See More Products

Events

View AllSubmit An Event
  • September 25, 2025

    Cloud or On-Premise: Navigating Access Control and Cybersecurity Choices

    ON DEMAND: Join Schneider Electric for an in-depth webinar exploring the critical decisions security professionals face when choosing between cloud-based or on-premise access control solutions. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing