Mobile Access Usage Statistics 2019

By Brian Rhodes, Published Jul 18, 2019, 09:19am EDT

The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

free image1

150+ integrators told us how often they use mobile access and the 3 key limitations holding back broader use.

Results **********

********* **** ************** **** integrators '*****' ** ****** deploy ****** ******:

Mobile Access Usage Statistics 2019

*******, **** ~**% **** us **** **** ****** access *** ******** ** the ****, *** ***** overall ****** ** *******, several ******* *** ******* it ****.

Key ********

********* ***** ******** ***** three ******* *** ******** broader ****** ****** ***:

  • ** ******: ********* ** *** have ******** ** ****** or ***** ****** ***********, and *** ******* **** traditional ***********.
  • *** ****** ******: **** ****** ***** have ***** ***** *** secure ****** ****** ** compared ** ******* *******.
  • *** *********: *** ******** ** mobile ** *** ******* the ****, ** **** cases * ****** ** 'extra' **** ******** ** traditional ***********.

** *******, '** ******' and '*** ****** ******' were ********* ****** ******* as *** ******* ******* explaining ****** ****** ********, with '*** *********' ********* as * ******* ***** reason.

No ******

* *** ****** ******** use ** ****** ****** is **** ****** **** end *****. **** *********** told ** **** ***** customers *** *** ****** or ********** ** ******** it ***:

  • "****. ** *** *** requested ** ** **** yet."
  • "*% ******* **** ** people ***'* **** ** install ********* **** ** open *****. ** ****** we ******* ****** ******* using **** ** ***********."
  • "****, *** *** **** requested."
  • "**** - ** ****** from *** ********* *** over ******** **** ***********."
  • "****, *** **** * lot ** ******** ** another ************** ****** ** manage ***** *** ***********."
  • "** **** **** ********* one ****** ** *** past **** **** ****** access. ** ******* *** solution ********* *** **** don’t **** ** *** mobile ***********."
  • "*% ***** **** ***** and ** **** **** see ****** ***** ** it. ** **** ** be ******* **** - not ******** ****!"
  • "****. * ***** **** is **** ** * residential ****** *** ** have ***** **** ***** for **, *** ***** push ** ** * secure ****** ** **** time."
  • "** **** **** *** two ********* ******* ****** access. **** *** **** with *** *** ********* readers. ** **** ** not *** * **** adoption ** **** ********** right ***."
  • "** *** ***; ***** 10%. *** ******** *** interested *** * ***** it *** **** ******* it *** **** ****** intent ** ***. **** two ********* **** * have **** ******** **** are ******** ***** *** technology."
  • "**** ***. ** ** an ****** **** ** provided, *** ******* ****** request/use *** *******."
  • "*%. *** **** **** via ************ ** *** client. ******** ** **** asked ** ***** ****** access *** *****-*** ********. Otherwise ***** *** **** no ********."

* ************ ****** ** weak ****** ** *** all ****** ************* ******* a ****** ********, *** even ***** **** ** often ** *** ******* promote ** ***** *** users. **** ***** *** party ******/ ******** *******, product ********* ** ********* marketed ** ***********. **** more ******* ******* ******, and **** **** **** to ****** ***** ********* to *** ******, ****** will ****** ********.

*******, ** ******** ** following ******** **********, ******** barriers ** '********' *** 'cost' *** ** ******* or **** ****** **** time, *** ***** ******* coupled **** *** '*******' of ****** ****** ** too ***** *** **** access ****** ** ******** yet.

Not ****** ******

**** *********** *** ***-***** are ********* ***** *** security ** ****** ****** systems, ************* *****, *** end-user ***** ******** ************ into ******** **** ****** systems:

  • "**% ***. *** **** users (****) ***'* **** to **** ** *********, for **** ******** *******."
  • "** ***** ****** *** to *** *** ********* but **** ***'* **** safe ****** *** ******* to ****** * ****** door **** ***** **** though *** ***** **** to ****** ***** **** enter * **** **** and ******** **** ****** app ** ******** *** to *** ******* ** you *** ****** *** door."
  • "**** ** *** ****** control ******* *** ******* and ******* **********. *** medical ********** ******* ** to **** *** ****** isolated. ******* ****** **** only."
  • "****. ****** ****** *****, business **** **** ******* over ***** ******."
  • "*%. ** *** ********* a ******* ********** **********. Though ** **** ****** with **** ********* ***** derived ***********, ** **** to *** *** ********, and ***** *******, ** use **** ********* (*** at *** ******) ****** we *** ****** ****** mobile ***********."
  • "**%. ** ***** ** closer ** ***% *** our ********** *********, *** we ** ****** *******."
  • "**** *** ***. *** reason ** *******, ***** is ***** ********"
  • "****. **'** *** **** executive ******** ******** ** this **** ********* *** in *** *** *** testing ***** ****** *** customers ***** **** *** a ******** **** ** phone ** ****** ** apps ******. "
  • "*%. ** ***'* **** that **** ** ******* yet *** ** *** exploring **. **** ** be **** ** ** secure."
  • "***, ******* ********* ***** security *******"
  • "****. ********* *** *** convinced **** ******** ******* are ******."

**** ** ***** ******** share **** ****** ****** is *** ********* ** market-specific ******** **************, ******* showing **** *****-***** *********** are *** ****** * good *** *** **********, high-security, *** ************* *********.

Too *********

* *********** ******* ** wider ****** *** ** higher ****, **** ** terms ** ****** ********** and ************** **** ******** to *********** ******** ***** and ****.

  • "*% **** ******** ********** subscriptions *** ******* *********, and *** *** ********* use ***********."
  • "**% ***** *** *** cost ** * *** factor."
  • "****. *** ******* *** purchasing ************ **** ** be *********** ** *** customers. **** **** ******** to ******** *** **** mobile *********** ** *** time. *** **** **** they ******. "
  • "** *** **** *** credentials **** *** ************ which ****** ****** ** the *** **** **** their ********* **** ** upgraded ***** ******."
  • "**** **** *% - the ****** ** *** complexity ** ******** ****** credentials *** ***** ****** cost ******** ** ******** credentials(cards, ****, ***)"
  • "**** ** * ******* of *** ****** ** provide ********* * ****** readers. *** *** ***** installed **** **** ******* but ** *** *** to ******** *** ******* in * ***** ***** usually *** ******** ** facility ******** ****** ****. The ********* **** ** a ****** ********** ** difficult ** **** ** customers."
  • "* ***** **** ** it ***** ** *** cost ** *** *** time ********** **** ** tied ** *** *****."
  • "*% **** **** **** & *** *********** *** expensive."
  • "** **** **** *%. Customers ***'* **** ** pay *** *** ********, and **** ***'* **** to ********** *** *******. Unfortunately, ** **** *** made *** ********** ** manage ** *** **** and **** *** *** because ** ***'* **** the *********."
  • "*. **'* * ***** pain *** **** *********. I *** **** ** to * ****** *** open *** **** ** under * ****** **** a ****. * ****** credential ** * ****. I ** **** ** phone ***, ****** **, find *** ***, *** into *** ***, **** the ***** ****, **** sure ** ********* ** on (******* **'* *** to **** *******, **** open *** ****."
  • "*% *** **** ****** access *********** ******* ** the ********** ***** *** the ******* *** ****."

** *******, *** **** of ******-***** ******* *** similar ** *********** ***** of '***-******' *****, *** we ****** ****** ****** mortality *** ********* ** result ** **** '****** ready' ******* ** ****** years.

*******, **** *** ********** incumbents **** ***, ******* for ****** *** * problem. *** ******** ******** mobile ********** ******* ** be * ****, '*** user' ******* **** **** the ****** *******(*** **** ****:*** ****** ******), ******* **** ****** access ******* **** ***** to **** ****** *********** using *** **** ***** as ******** *****, ** a '*** *****', *** device *****.

Systems *** ***** ****** *****, *** ******

*************, **** ***** **** even ***** ****** ****** adoption ** ***, **** already **** ******** *** capability ** *** ******* they ****.

*** ****** ********* ** 'mobile ****** ** ***** when ***** ***' ** internal ******** ** ****** use *** ********** ** change.

  • "****** *** *** ******* included ******-***** *******. **** about *% ** *** customers *** ******** ***** the ****** *********** *** they **** ** ** ready *** **** **** decide ** **** ** out."
  • "** *** ******** ** if *** ******* ********* have *** **********, *********** 95% ** ****. ** the ******** ** *** many *** ******** *****, 10%. ***** * *** talking ***** ** *** sales *****, ** ****** gets *********** *** ** the ********* ********** ** go ******* **** *** extra ************* *** ****** of ****** ***********. ******** understands *********** *****/****."
  • "*** ** *** ******* now **** *** ********** through ** *** *** user ******** *** **** light. *** ** *** customers *** ********** ** using ***** ****** ** credentials. **** ***'* **** to *** ***** ******** phones *** ****."
  • "***% *********, ***** **% adoption"
  • "** ** *** * regularly ********* ******* **** our ****** ******* ****. It ***** **** *** DSX ******* ******** *****. But ****** ** ** have ********* ********** ** utilizing **."
  • "**** **** *%, ****** is **** ********, * have ********* **** **** purchased ****** ***** *******, but *** ***** ***** cards"
  • "** *** ** ****** dealer *** **** ******* is *****-** ** *** RC-04 ** ** ** available ** ***** *** percent ** *** ************* and ** **** **** it ********* ** ***** 50 ******* ** *** applications. ** **** ** a ***** ******* *******."
  • "*** ** *** *** install ******** ****** *************** for *** ***** ******* very *** ********* ******** use **** ** *** mindset ** ******** ***** force **** ** *** standard *********** ***** ********* specific *****."
  • "***% *** ** *** systems **** ** ******* can ****** ***** *** customers *****, *** **** about **% ** **** actually *** *** *******."

Strong ******* *******

******* ****** *** ** widely ******* *** ***, a ******* ****** ** high-percentage ***** ************ ********* the ******* ****** ** the *******.

******, ***** *********** **** that ****** ****** * new ********* ************** ********** to ******* ** *** typically *** **************, ****-********* access ******:

  • "*** *** **** **** it ** * *********** for *** ******** ** unlock ********. **’* * good ******* ***** ** well **** *********."
  • "***%. ** ** **** to **** **** ********** access."
  • "****** ***** ****** ***** phone *** *** ********* different **** *** ** the *********** *** *******."
  • "**% ** *** *** installations ******* ******* ********* Go. ***** ** **** for ***** ** ****** and **** ***** **** a ********."
  • "** *** ******* *** discussions **** **** ********** to **** *** ********* of *** *******"
  • "**-**%. ********* ****** **** the ***** *********** ** unlocking ***** ******** **** their *****."
  • "**% ******** ******** *** mobile ******. ** * feature ** *** ******** (Genetec ******** ******) ********* find **** * ****** feature ** *** ***** they **** ** ******** release * ****"
  • "**% ******* ( ** sell * *** ** Brivo *** ** ** a *** ******* ***** that ********* ***'* **** to ***** **** ******) also ********** ********* **** the ******* ** ***** able ** **** ********** from * ******** *** contractors ** ********."
  • "**%, ******* **'* * great ******* *** ********* has * *****."
  • "****** ****** ****** ********. Users ******* ***** ***** phones ******** **** **."

Upcoming ****** ********

**** *** ********* ******* individual ***** *** **** compare / ***** **** out ******* **** ***** in ****** *****.

***** *** *** ********** test *******:

Comments (4)

** ** ***-****, *** of *** *** ************* include ****** ******* *******.  We **** ********* **** limited ******* **** * select ******** ********** **** positive *******; *******, ** still ******* ********* ** **** and ******* * ********* badge ***** ******* *** benefits ** ***** * mobile **********.  ** ** allow ********* ** **** wearing * ********* *****, we ***** ********** ****** our *******-**-***** ******** ***** there would ** ** ******* ********** between ********** *** ************ personnel ****** *** **********.  If ******* ********** **** an ****** ***** ********* use **** ****** ***********, there ** ** *** to ****** ******** *** unauthorized ********** (****** ***** is * *****, ****-**** employee **********).

** *** ******** ******* for * ******** ** this *****.  ** **** * way ** ******** ****** employee ********** *** ****** while **** *** ****** ****** areas.  ******* **** **********, I ** *** *** mass ******** ** ****** credentials ****** ** ***** with extremely *** ******** ************.

***** *** ****** **. For **** ********* *** difficult ** ********* **** in **** ** * physical ***** *** ** self ******* ************/******** **** stipulate **** ******** ******* visible ***** **. ***** policies ***** ***** ** contractors *** ******* ** well *** **** **** a ********* ***** ** some **** ***** ******. 

* ******* ****** ** the *** ***** ***** to ********* *** ******* benefits ** **** ***** will ** * ******* push ** ***** ***** policies *** ********** ** make **** *** **** if ** * ******* capacity. 

* ****** *** **** respondents **** **** ******** risks **** * ****** for *** ***** ****** credentials *** *****/******* *** kHz ********* *****. 

**** *** ****** ******* about ******** **** ** backwards. **** * ****** few *** '****' ** app, *** ****** *** 'borrow' * *****, *** it's **** ****** ** do ***********.  *** ********* value * ****** *** brings ** **** ***** are *** **** *********** aware ** ***** *****. This ***** *****://***.**********.***/**************/****-********-******-****/**-*************************** ***** **** ***** ****** their ****** *** ***** a *** ** *******,  ******* they ****** **** ***** their ***** **. *** the **** ********** ** the ***** *****'* ** a **** ***** ** help **** ****.

***, ******* ** * mobile ********** ** **** a **** *********** ** short *******. * ***** is * ******** **** knows

- ***** ** **,  it ***** ** **** to ****** ******* ** real ****, ** ******** access ***** ** ********* to *** ******** ***** accessed ** ********** **** door *** ****** ***** to ******.

- *** ******* ********** - ******* *** ** more ****** ************** **** authentication ***** ********** ** the ********** *** ********* biometrics **  * ******/****/**** basis, eliminating *** **** ********* gear ** *** ****.

-*********** - ******* **** notifications (**** ** ******** notifications), *********** **** ****** (silent **** *** ****).

- ****** ***** *** pictures

*** ** **** **** so ***'* **** ******** of * ***** ** a *********** *** * credential *** ***** ********* what ** *** ** with ** ** **** security *******.

Read this IPVM report for free.

This article is part of IPVM's 6,653 reports, 896 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now
Loading Related Reports