Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyPhysical SecurityVideo Surveillance

Education & Training

Vertical markets benefit from mobile and cloud access solutions

By George Martinez
person in mask
January 14, 2022

As an enabling technology for physical security, cloud connectivity can improve on-demand availability to software and data. For video surveillance, the cloud can reduce storage and maintenance costs with ready access to live camera feeds and recorded video. In electronic access control deployments, leveraging the cloud can bring flexibility to remote issuance and enable mobile credentials for keyless entry at the edge.  

With cloud-based access control, organizations can expand access with edge-controlled doors and smartphone apps for user access.

Without dependency on a head-end system at the protected premises, smart edge readers with cloud and mobile technologies can reduce hardware and labor costs while simplifying remote management of users with secure access across locations and facilities.

Readers with Bluetooth or Near Field Communications (NFC) can allow security teams to manage and control access to virtually anything, since such readers can operate autonomously with just mobile credentials that function as a user’s digital smart key for day and time scheduled access. Being able to control access to doors, gates and electrified locks or latches with only local power and no need for network connectivity can also simplify keyless entry deployment options.

Though cloud-based solutions offer users easy access to systems and data from virtually any location, including the ability to leverage mobile apps; scalability without much upfront investment in technology; and quick installations because locations do not require an onsite server, there are times when a cloud-based access control system might not make the most sense. Examples could be highly secure facilities, such as data centers, or large-scale enterprise access control customers, such as hospitals who have already made a considerable investment in on-premise servers. In that case, organizations wouldn’t necessarily realize the cost-savings of implementing a cloud solution, since significant on-premise investments have already been made.

However, for organizations in a number of vertical markets, including retail, fitness, multi-tenant and college campuses, the benefits of mobile and cloud-based access control can be significant.

Multifamily Residential and Property Management — Each time a tenant leaves and a new renter moves in, doors need to be rekeyed. This practice also extends to reprogramming cards, fobs or PINs for common areas or front entrances of gated communities. In a location with a high rotation of people, the cost of issuing cards and fobs and managing PINs can escalate quickly, while lost keys increase security risk. Cloud-managed keyless entry can eliminate the need for facility managers to rekey doors or manage lost keys.

Utilities/Telecom Co-Location Spaces — Remote sites, facilities or service closets that reside off corporate-managed real estate locations often rely on physical lock and keys, especially those with no local IT network access. With an electrified lock and intelligent reader paired with mobile cloud technology, remote facilities can leverage single devices that are network-connected to manage user access.

24-Hour Fitness Centers/Gyms/Health Centers — With a fluid and readily-changing membership or visitor base, mobile technology can allow users to access gyms, lockers and other areas with their smartphones. Facility managers can manage and reprogram access remotely.

Universities — By leveraging smartphone-based credentials and wireless locks, a college campus can control, manage and restrict access without magnetic stripe or smart card issuance. Mobile credentials can also provide convenience to a population already using their mobile devices for daily tasks.

Marinas and RV Parks — With the goal of restricting access to high-value assets, users at these types of properties can log into the cloud for record-keeping reports of access and can also revoke or reinstate access permissions remotely.

Standalone Kiosks and Shop-and-Go Retail — Similar to the Amazon Go concept, another emerging application for cloud-managed mobile access is unattended retail locations, which can be found in shopping malls or within an existing building, such as an airport. These kiosks and shop-and-go retailers can allow users to make purchases and pickups without an attendant present. Access to a pickup locker can automatically be revoked after a package has been retrieved.

For vertical markets that can deploy mobile access and cloud-based access control, such deployments reduce hardware and network dependencies on premises and present opportunities for security and facility managers to manage access remotely as well as deploy access at the edge in individual, remote or changing locations.

As the pace of innovation accelerates, smart edge technology for access control applications will continue to improve with additional capabilities, including leveraging analytics and artificial intelligence already available through the cloud.

KEYWORDS: enterprise security risk management security analytics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Martinez

George Martinez is the Director of Product Management of OpenBlue Security & Innovation cloud initiatives for Johnson Controls. Over the past seven years with Johnson Controls, Martinez has held senior product management roles. Prior to Johnson Controls, Martinez brought more than 20 years of physical security market experience and served in senior roles for brands such as Mace Security Products, GE Security, Interlogix and CASI-RUSCO. Bio image courtesy of George Martinez, JCI

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • smart access control system

    How enterprise security leaders can benefit from access control in coworking spaces

    See More
  • dormakaba access control

    The enhanced role of touch-free and mobile access solutions drive a new normal

    See More
  • smarphone

    Reporting and Administrating: Manage Physical Access Control from Mobile Devices

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Whitepaper-Social-Media-3.gif

    Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing