Security Sales & Integration January 2022 - 44

Access
Running With More
Robust Platforms
With touchless access control
solutions like mobile
credentials, Bluetooth readers
and touch-free exit buttons,
end-user staff can minimize
contact while maintaining
proper security procedures.
access control solutions like mobile credentials,
Bluetooth readers and touch-free exit buttons,
staff can minimize contact while maintaining
proper security procedures.
For example, some manufacturers offer
solutions that can deploy new credentials with
no physical unit, and authorized visitors can
be emailed a QR code that will grant them
access to the building, all in a simplified, contactless
way.
Being touchless is not the only benefit that
mobile credentials offer. Because smartphones
have grown to be so woven into daily life,
most individuals realize that their phone is no
longer within reach in just a short amount of
time. This almost universal experience is ideal
in keeping premises secure. Physical keys,
badges, or ID cards that remain in a closed-off
area like a pocket or purse all day could take
hours or even days for someone to realize it's
been lost.
With the
significant
advancements in
how credentials
are created,
delivered, and
authenticated,
many changes
have been
made regarding
traditional
keypads and
readers.
The amount of time it could take for an individual
to recognize their badge is lost creates
an opportunity for someone to access a building
without the proper clearance. And unfortunately,
in this scenario, when the improper individual
enters, the system wouldn't realize that the individual
is not who they say they are. However,
mobile access control grants a different scenario.
When someone realizes their phone is missing,
they can report it and instantly remove the credential
to stop a security incident. It's also important
to note that the mobile credential is not
obtainable until the access control app is started,
meaning the digital badge will not be available
for the imposter to use.
Smartphones also often utilize two-factor authentication
or biometrics and store identifying
information behind password-protected screens.
For example, suppose an individual's key, card,
or ID badge becomes lost. In that case, anyone
who finds it will know what the individual looks
like and crucial identifying information about
them, like where they work or attend school,
and possibly other data. If password protection
is vital to an organization's needs, smartphones
and mobile credentials offer numerous options
in terms of password protection.
Mobile credentials can also significantly decrease
the costs associated with physical keys,
badges or cards by doing away with the process
of key duplication or rekeying. They can serve
as a scalable, sustainable, and flexible solution
for many organizations that regularly replace
44
Security Sales & Integration JANUARY 2022
keys like hotels, libraries, and college campuses.
Mobile credentials also serve as a greener
option and will not end up in a landfill at the
end of their life.
Changes in Traditional
Keypads & Readers
With the significant advancements in how credentials
are created, delivered, and authenticated,
many changes have been made regarding
traditional keypads and readers. For example,
many manufacturers now offer readers intended
to simplify the entirety of the access control
process and have created readers that recognize
magnetic, stripe, proximity, smart cards, and
NFC-enabled smart devices. They fully incorporate
the integration trend and make both integrators'
and end users' lives more straightforward
and convenient.
Using open architecture platforms designed
to work with industry standards and common
access control system interfaces, these manufacturers
create keypad and reader solutions that
will scale alongside the organization they serve
regardless of whether they have an on-premise or
Cloud-based solution. Integrators and end users
should search for readers to fit various placement
needs that include a modern design to complement
any facility and its existing hardware.
The Path Forward
As the ongoing integration trend continues
in the security industry, manufacturers will
continue to rise to the challenge to create robust,
sustainable, and cost-effective solutions
for integrators and end users. Because many
manufacturers understand the integrators
and end users need for flexibility and scalable
technology, new solutions will continue to be
improved upon, especially with the integrator
in mind.
Most manufacturers are happy to provide
opportunities for integrators to increase their
RMR by creating Cloud-based access control
solutions and creating products that can be easily
integrated with end users' and integrators'
existing portfolios. And Integrators can rest assured
knowing that manufacturers are thinking
of them while creating solutions and understanding
that these changes will only strengthen
the relationship between the two. SSI
SCOT STURGES is Director of Business
Development, North America, ACRE.
securitysales.com
ZEPHYR_P/STOCK.ADOBE.COM
http://www.securitysales.com

Security Sales & Integration January 2022

Table of Contents for the Digital Edition of Security Sales & Integration January 2022

Security Sales & Integration January 2022 - Cover1
Security Sales & Integration January 2022 - Cover2
Security Sales & Integration January 2022 - 1
Security Sales & Integration January 2022 - 2
Security Sales & Integration January 2022 - 3
Security Sales & Integration January 2022 - 4
Security Sales & Integration January 2022 - 5
Security Sales & Integration January 2022 - 6
Security Sales & Integration January 2022 - 7
Security Sales & Integration January 2022 - 8
Security Sales & Integration January 2022 - 9
Security Sales & Integration January 2022 - 10
Security Sales & Integration January 2022 - 11
Security Sales & Integration January 2022 - 12
Security Sales & Integration January 2022 - 13
Security Sales & Integration January 2022 - 14
Security Sales & Integration January 2022 - 15
Security Sales & Integration January 2022 - 16
Security Sales & Integration January 2022 - 17
Security Sales & Integration January 2022 - 18
Security Sales & Integration January 2022 - 19
Security Sales & Integration January 2022 - 20
Security Sales & Integration January 2022 - 21
Security Sales & Integration January 2022 - 22
Security Sales & Integration January 2022 - 23
Security Sales & Integration January 2022 - 24
Security Sales & Integration January 2022 - 25
Security Sales & Integration January 2022 - 26
Security Sales & Integration January 2022 - 27
Security Sales & Integration January 2022 - 28
Security Sales & Integration January 2022 - 29
Security Sales & Integration January 2022 - 30
Security Sales & Integration January 2022 - 31
Security Sales & Integration January 2022 - 32
Security Sales & Integration January 2022 - 33
Security Sales & Integration January 2022 - 34
Security Sales & Integration January 2022 - 35
Security Sales & Integration January 2022 - 36
Security Sales & Integration January 2022 - 37
Security Sales & Integration January 2022 - 38
Security Sales & Integration January 2022 - 39
Security Sales & Integration January 2022 - 40
Security Sales & Integration January 2022 - 41
Security Sales & Integration January 2022 - 42
Security Sales & Integration January 2022 - 43
Security Sales & Integration January 2022 - 44
Security Sales & Integration January 2022 - 45
Security Sales & Integration January 2022 - 46
Security Sales & Integration January 2022 - 47
Security Sales & Integration January 2022 - 48
Security Sales & Integration January 2022 - 49
Security Sales & Integration January 2022 - 50
Security Sales & Integration January 2022 - 51
Security Sales & Integration January 2022 - 52
Security Sales & Integration January 2022 - 53
Security Sales & Integration January 2022 - 54
Security Sales & Integration January 2022 - 55
Security Sales & Integration January 2022 - 56
Security Sales & Integration January 2022 - 57
Security Sales & Integration January 2022 - 58
Security Sales & Integration January 2022 - 59
Security Sales & Integration January 2022 - 60
Security Sales & Integration January 2022 - 61
Security Sales & Integration January 2022 - 62
Security Sales & Integration January 2022 - 63
Security Sales & Integration January 2022 - 64
Security Sales & Integration January 2022 - Cover3
Security Sales & Integration January 2022 - Cover4
https://www.nxtbook.com/emerald/securitysales/august_2023
https://www.nxtbook.com/emerald/securitysales/july_2023
https://www.nxtbook.com/emerald/securitysales/june_2023
https://www.nxtbook.com/emerald/securitysales/may_2023
https://www.nxtbook.com/emerald/securitysales/april_2023
https://www.nxtbook.com/emerald/securitysales/march_2023
https://www.nxtbook.com/emerald/securitysales/february_2023
https://www.nxtbook.com/emerald/securitysales/january_2023
https://www.nxtbook.com/emerald/securitysales/december_2022
https://www.nxtbook.com/emerald/securitysales/november_2022
https://www.nxtbook.com/emerald/securitysales/october_2022
https://www.nxtbook.com/emerald/securitysales/september_2022
https://www.nxtbook.com/emerald/securitysales/august_2022
https://www.nxtbook.com/emerald/securitysales/july_2022
https://www.nxtbook.com/emerald/securitysales/june_2022
https://www.nxtbook.com/emerald/securitysales/may_2022
https://www.nxtbook.com/emerald/securitysales/april_2022
https://www.nxtbook.com/emerald/securitysales/march_2022
https://www.nxtbook.com/emerald/securitysales/february_2022
https://www.nxtbook.com/emerald/securitysales/january_2022
https://www.nxtbook.com/emerald/securitysales/december_2021
https://www.nxtbook.com/emerald/securitysales/november_2021
https://www.nxtbook.com/emerald/securitysales/october_2021
https://www.nxtbook.com/emerald/securitysales/september_2021
https://www.nxtbook.com/emerald/securitysales/august_2021
https://www.nxtbook.com/emerald/securitysales/july_2021
https://www.nxtbook.com/emerald/securitysales/june_2021
https://www.nxtbook.com/emerald/securitysales/may_2021
https://www.nxtbook.com/emerald/securitysales/apr_2021
https://www.nxtbookmedia.com