Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity NewswireTechnologies & SolutionsAccess ManagementIdentity ManagementPhysical Security

Physical access control: Survey reveals new deployment trends

By Luc Merredew
access-control-freepik1170x658.jpg

Image via Freepik

December 14, 2022

As HID Global’s most recent survey shows, users’ perceptions about Physical Access Control Systems (PACS) have undergone a significant transformation from 2020 to the present. The pandemic paused our annual glimpse into user opinions about their daily PACS experiences before revealing a key new trend in 2022: a declining belief that current systems either meet or exceed requirements. More than half thought this was true in 2020, but in 2022, after more than a year of pandemic challenges and learnings, this figure dropped to 41%. Organizational practices have been fundamentally altered, and this has had big implications for how PACS solutions are specified and deployed.

 

Mobile Access Joins the Mix

As much as things have changed, they also have stayed the same. Mobile access has moved to the forefront but without diminishing the continuing relevance of traditional credentials and physical badges, despite their vulnerabilities.


Yes, these physical cards and badges are unencrypted and much easier to clone than modern options. Our 2020 study showed that almost one-third of respondents use 125 kHz low-frequency (also known as proximity) cards, and 35% said they still use magnetic stripe cards. At the same time, though, 32% of respondents said they were actively using mobile IDs, and 30% said the same about biometric technology, including fingerprint, facial or iris solutions. Many who have not already adopted these modern technologies intend to do so: 17% said they planned to upgrade, or are in the process of upgrading, to biometric access control, and 19% said the same about mobile technology upgrades.


One of the most valuable attributes of mobile technology during the pandemic has been its ability to reduce or eliminate physical touchpoints. But there is more to consider: reorienting processes to touchless experiences also drove the adoption of new applications that also benefitted from these contact-free interactions. Mobile access solutions not only improved safety and security but also convenience and efficiency in both the physical and digital worlds.


A growing interest in mobile access is expected to continue in a world that is likely forever changed, in many ways, by the pandemic. At the same time, these solutions have moved to trusted ecosystems of cloud-connected access control devices, applications and mobile identities that are consolidated into a single place and much easier to adopt. With this model, a variety of new building services can now be securely accessed through a person’s mobile phone and other devices that are part of these trusted ecosystems. In addition to improving user convenience, mobile access helps future-proof solutions and gives users more credential technology choices.


Logical access technology that is used for secure computer/network login is also of growing interest to the respondents that participated in HID Global’s survey: 55% of respondents are now using this technology to access the cloud and web resources. One reason may be that security and IT teams must ensure that employees working remotely from home or elsewhere can securely access the systems, applications and other resources they need to do their jobs.

 

Ranking Industry Challenges

Among the challenges that survey respondents were asked to rank in importance to them, improving user convenience was at the top, with 43% saying that PACS administration was not easy enough. Moving down the list, 27% of survey respondents said ‘integrating with other enterprise systems’ was one of their top three challenges. The integration challenge has become easier as users have moved away from proprietary technology to OSDP and other open platforms. This enables connected devices to relay information to each other, which is a prerequisite for determining and implementing automated actions.


Respondents also ranked upgrades among their top concerns. Today’s installers, integrators, consultants, and vendors have multiple demands and departmental influences to balance as they work with their end-users to upgrade solutions and deploy new features. While C-suite leadership often decides what upgrades to implement, a majority of respondents also said that physical security, IT and information security, and facilities teams at least make recommendations, and some make the final decision.


The survey also showed how physical security and cyber/IT security departments are now expected to work more closely together on upgrades. One reason for this is that many of today’s IP-based physical security systems and devices are now directly attached to the organizational network. While this has benefits, it also creates vulnerabilities. IT professionals can’t simply rely on vendors to give their systems ISO 27001 compliance and other ‘built-in’ protection. They also must ensure that their access control readers or other parts of the PACS infrastructure that are attached to their network don’t introduce threats.


Respondents also weighed in on the obstacles they encountered when planning and implementing access control upgrades. One obstacle is the cost of upgrading —  38% of respondents said this was their biggest barrier to green-lighting a project. Other obstacles included inadequate ROI or the lack of budget prioritization (15% of respondents). No matter the obstacle they faced, 38% said they will either update or upgrade some portion of their access control system by the end of 2022.


Organizations also know that some upgrade benefits are more compelling than others for getting an upgrade project off the ground. One of these benefits is the long-term convenience of moving beyond proprietary access control models to open standards and solutions that have greater longevity and adaptability.


On this subject, 49% of respondents said they wanted their access control system to provide ‘the ability to add or support new tech in the future, and 28% stated their desire for ‘open-standards-based tech.’ Similarly, 33% said that whatever solution they adopted should enable ‘integration with existing security platforms.’

 

Pandemic-Related Changes

Among the pandemic’s many impacts, changes in work patterns may have impacted access control the most. For instance, when responding to survey questions about upgrading to new technology —  43% singled out ‘touchless/contactless capabilities.’ They may have used these touchless capabilities to deploy pandemic-related workplace health and safety measures — 41% said they want to use mobile in any new access control systems, and when asked in a separate question about the single most impactful technology for improving PACS, touchless technologies were mentioned by 20% of respondents and mobile access by 18%.


Organizations now operating a hybrid (remote and in-person) workplace model have also seen building occupancy monitoring become increasingly critical for sustaining efficiency and enabling organizations to make informed decisions about building usage and operation. This requires access to much more data than was previously available. Yes, decision-makers need to know how many people are inside a building or otherwise on-site to support safety and emergency evacuation measures. But equally important is data derived from Real-Time Location Systems (RTLS). 39% of survey respondents said their organizations know how many employees and visitors are on site, and where. Only 21% said they cannot monitor either, or at least have not yet chosen to do so; and, 34% of respondents only know how many employees and visitors are on the premises. They do not know each person’s location.


These types of occupancy data will have additional uses in the future. For example, those businesses that had real-time occupancy data over the past two years could better assess their office space requirements and streamline operations and associated costs. They had much better visibility into how much of their office space was being used. Other organizations used real-time occupancy data to ease the shift to a hybrid work model. They were able to improve planning and know that the necessary desk space was available when and where it was needed.


Survey respondents shed light on the growing use of access control systems to monitor this occupancy data — 42% said they used access control systems in this way; and, 34% of respondents said they used access control systems to monitor visitor occupancy. Some respondents also used access control systems for time and attendance tracking: 24% of respondents said they used these systems to track employee time and attendance, while 15% did the same with visitors.


The increased use of PACS technologies like mobile access for creating touchless building experiences and RTLS for monitoring building occupancy data are just two unexpected outcomes of the global pandemic. These outcomes may have been spurred by pandemic-related requirements such as facilitating touchless hygiene and safety practices or enabling millions of workers to switch to various remote and hybrid workplace models. But as the world moves through and beyond many of those requirements, demand for these PACS technologies is not waning. In addition to improving health, safety and building efficiency, these technologies also increase security and convenience while delivering a superior workplace experience.

KEYWORDS: access control physical security risk management security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Luc Merredew is Director of Product Marketing with HID Global.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Do not enter sign

    New report identifies top 5 trends in physical access control

    See More
  • security camera

    2023 security industry trends highlight access control & cybersecurity

    See More
  • Access control data

    Annual access control trends report shows security is still an issue as offices reopen

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products

Events

View AllSubmit An Event
  • April 16, 2025

    Modernizing GSOC Operations: Ensuring Full Control and Complete Situational Awareness

    ON DEMAND: For many organizations, physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!