Mobile Access Usage Statistics 2019

By: Brian Rhodes, Published on Jul 18, 2019

The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

free image1

150+ integrators told us how often they use mobile access and the 3 key limitations holding back broader use.

*** ******* ** *** ****** phones ** ****** *********** is *** ** *** biggest ****** ** * market **** ************ *** been **** ** ******** new **********.

free image1

***+ *********** **** ** how ***** **** *** mobile ****** *** *** 3 *** *********** ******* back ******* ***.

[***************]

Results **********

********* **** ************** **** integrators '*****' ** ****** deploy ****** ******:

Mobile Access Usage Statistics 2019

*******, **** ~**% **** us **** **** ****** access *** ******** ** the ****, *** ***** overall ****** ** *******, several ******* *** ******* it ****.

Key ********

********* ***** ******** ***** three ******* *** ******** broader ****** ****** ***:

  • ** ******: ********* ** *** have ******** ** ****** or ***** ****** ***********, and *** ******* **** traditional ***********.
  • *** ****** ******: **** ****** ***** have ***** ***** *** secure ****** ****** ** compared ** ******* *******.
  • *** *********: *** ******** ** mobile ** *** ******* the ****, ** **** cases * ****** ** 'extra' **** ******** ** traditional ***********.

** *******, '** ******' and '*** ****** ******' were ********* ****** ******* as *** ******* ******* explaining ****** ****** ********, with '*** *********' ********* as * ******* ***** reason.

No ******

* *** ****** ******** use ** ****** ****** is **** ****** **** end *****. **** *********** told ** **** ***** customers *** *** ****** or ********** ** ******** it ***:

  • "****. ** *** *** requested ** ** **** yet."
  • "*% ******* **** ** people ***'* **** ** install ********* **** ** open *****. ** ****** we ******* ****** ******* using **** ** ***********."
  • "****, *** *** **** requested."
  • "**** - ** ****** from *** ********* *** over ******** **** ***********."
  • "****, *** **** * lot ** ******** ** another ************** ****** ** manage ***** *** ***********."
  • "** **** **** ********* one ****** ** *** past **** **** ****** access. ** ******* *** solution ********* *** **** don’t **** ** *** mobile ***********."
  • "*% ***** **** ***** and ** **** **** see ****** ***** ** it. ** **** ** be ******* **** - not ******** ****!"
  • "****. * ***** **** is **** ** * residential ****** *** ** have ***** **** ***** for **, *** ***** push ** ** * secure ****** ** **** time."
  • "** **** **** *** two ********* ******* ****** access. **** *** **** with *** *** ********* readers. ** **** ** not *** * **** adoption ** **** ********** right ***."
  • "** *** ***; ***** 10%. *** ******** *** interested *** * ***** it *** **** ******* it *** **** ****** intent ** ***. **** two ********* **** * have **** ******** **** are ******** ***** *** technology."
  • "**** ***. ** ** an ****** **** ** provided, *** ******* ****** request/use *** *******."
  • "*%. *** **** **** via ************ ** *** client. ******** ** **** asked ** ***** ****** access *** *****-*** ********. Otherwise ***** *** **** no ********."

* ************ ****** ** weak ****** ** *** all ****** ************* ******* a ****** ********, *** even ***** **** ** often ** *** ******* promote ** ***** *** users. **** ***** *** party ******/ ******** *******, product ********* ** ********* marketed ** ***********. **** more ******* ******* ******, and **** **** **** to ****** ***** ********* to *** ******, ****** will ****** ********.

*******, ** ******** ** following ******** **********, ******** barriers ** '********' *** 'cost' *** ** ******* or **** ****** **** time, *** ***** ******* coupled **** *** '*******' of ****** ****** ** too ***** *** **** access ****** ** ******** yet.

Not ****** ******

**** *********** *** ***-***** are ********* ***** *** security ** ****** ****** systems, ************* *****, *** end-user ***** ******** ************ into ******** **** ****** systems:

  • "**% ***. *** **** users (****) ***'* **** to **** ** *********, for **** ******** *******."
  • "** ***** ****** *** to *** *** ********* but **** ***'* **** safe ****** *** ******* to ****** * ****** door **** ***** **** though *** ***** **** to ****** ***** **** enter * **** **** and ******** **** ****** app ** ******** *** to *** ******* ** you *** ****** *** door."
  • "**** ** *** ****** control ******* *** ******* and ******* **********. *** medical ********** ******* ** to **** *** ****** isolated. ******* ****** **** only."
  • "****. ****** ****** *****, business **** **** ******* over ***** ******."
  • "*%. ** *** ********* a ******* ********** **********. Though ** **** ****** with **** ********* ***** derived ***********, ** **** to *** *** ********, and ***** *******, ** use **** ********* (*** at *** ******) ****** we *** ****** ****** mobile ***********."
  • "**%. ** ***** ** closer ** ***% *** our ********** *********, *** we ** ****** *******."
  • "**** *** ***. *** reason ** *******, ***** is ***** ********"
  • "****. **'** *** **** executive ******** ******** ** this **** ********* *** in *** *** *** testing ***** ****** *** customers ***** **** *** a ******** **** ** phone ** ****** ** apps ******. "
  • "*%. ** ***'* **** that **** ** ******* yet *** ** *** exploring **. **** ** be **** ** ** secure."
  • "***, ******* ********* ***** security *******"
  • "****. ********* *** *** convinced **** ******** ******* are ******."

**** ** ***** ******** share **** ****** ****** is *** ********* ** market-specific ******** **************, ******* showing **** *****-***** *********** are *** ****** * good *** *** **********, high-security, *** ************* *********. 

Too *********

* *********** ******* ** wider ****** *** ** higher ****, **** ** terms ** ****** ********** and ************** **** ******** to *********** ******** ***** and ****.

  • "*% **** ******** ********** subscriptions *** ******* *********, and *** *** ********* use ***********."
  • "**% ***** *** *** cost ** * *** factor."
  • "****. *** ******* *** purchasing ************ **** ** be *********** ** *** customers. **** **** ******** to ******** *** **** mobile *********** ** *** time. *** **** **** they ******. "
  • "** *** **** *** credentials **** *** ************ which ****** ****** ** the *** **** **** their ********* **** ** upgraded ***** ******."
  • "**** **** *% - the ****** ** *** complexity ** ******** ****** credentials *** ***** ****** cost ******** ** ******** credentials(cards, ****, ***)"
  • "**** ** * ******* of *** ****** ** provide ********* * ****** readers. *** *** ***** installed **** **** ******* but ** *** *** to ******** *** ******* in * ***** ***** usually *** ******** ** facility ******** ****** ****. The ********* **** ** a ****** ********** ** difficult ** **** ** customers."
  • "* ***** **** ** it ***** ** *** cost ** *** *** time ********** **** ** tied ** *** *****."
  • "*% **** **** **** & *** *********** *** expensive."
  • "** **** **** *%. Customers ***'* **** ** pay *** *** ********, and **** ***'* **** to ********** *** *******. Unfortunately, ** **** *** made *** ********** ** manage ** *** **** and **** *** *** because ** ***'* **** the *********."
  • "*. **'* * ***** pain *** **** *********. I *** **** ** to * ****** *** open *** **** ** under * ****** **** a ****. * ****** credential ** * ****. I ** **** ** phone ***, ****** **, find *** ***, *** into *** ***, **** the ***** ****, **** sure ** ********* ** on (******* **'* *** to **** *******, **** open *** ****."
  • "*% *** **** ****** access *********** ******* ** the ********** ***** *** the ******* *** ****."

** *******, *** **** of ******-***** ******* *** similar ** *********** ***** of '***-******' *****, *** we ****** ****** ****** mortality *** ********* ** result ** **** '****** ready' ******* ** ****** years.

*******, **** *** ********** incumbents **** ***, ******* for ****** *** * problem. *** ******** ******** mobile ********** ******* ** be * ****, '*** user' ******* **** **** the ****** ** ***** (*** **** ****: *** ****** ******), ******* **** ****** access ******* **** ***** to **** ****** *********** using *** **** ***** as ******** *****, ** a '*** *****', *** device *****.

Systems *** ***** ****** *****, *** ******

*************, **** ***** **** even ***** ****** ****** adoption ** ***, **** already **** ******** *** capability ** *** ******* they ****.

*** ****** ********* ** 'mobile ****** ** ***** when ***** ***' ** internal ******** ** ****** use *** ********** ** change.

  • "****** *** *** ******* included ******-***** *******. **** about *% ** *** customers *** ******** ***** the ****** *********** *** they **** ** ** ready *** **** **** decide ** **** ** out."
  • "** *** ******** ** if *** ******* ********* have *** **********, *********** 95% ** ****. ** the ******** ** *** many *** ******** *****, 10%. ***** * *** talking ***** ** *** sales *****, ** ****** gets *********** *** ** the ********* ********** ** go ******* **** *** extra ************* *** ****** of ****** ***********. ******** understands *********** *****/****."
  • "*** ** *** ******* now **** *** ********** through ** *** *** user ******** *** **** light. *** ** *** customers *** ********** ** using ***** ****** ** credentials. **** ***'* **** to *** ***** ******** phones *** ****."
  • "***% *********, ***** **% adoption"
  • "** ** *** * regularly ********* ******* **** our ****** ******* ****. It ***** **** *** DSX ******* ******** *****. But ****** ** ** have ********* ********** ** utilizing **."
  • "**** **** *%, ****** is **** ********, * have ********* **** **** purchased ****** ***** *******, but *** ***** ***** cards"
  • "** *** ** ****** dealer *** **** ******* is *****-** ** *** RC-04 ** ** ** available ** ***** *** percent ** *** ************* and ** **** **** it ********* ** ***** 50 ******* ** *** applications. ** **** ** a ***** ******* *******."
  • "*** ** *** *** install ******** ****** *************** for *** ***** ******* very *** ********* ******** use **** ** *** mindset ** ******** ***** force **** ** *** standard *********** ***** ********* specific *****."
  • "***% *** ** *** systems **** ** ******* can ****** ***** *** customers *****, *** **** about **% ** **** actually *** *** *******."

Strong ******* *******

******* ****** *** ** widely ******* *** ***, a ******* ****** ** high-percentage ***** ************ ********* the ******* ****** ** the *******.

******, ***** *********** **** that ****** ****** * new ********* ************** ********** to ******* ** *** typically *** **************, ****-********* access ******:

  • "*** *** **** **** it ** * *********** for *** ******** ** unlock ********. **’* * good ******* ***** ** well **** *********."
  • "***%. ** ** **** to **** **** ********** access."
  • "****** ***** ****** ***** phone *** *** ********* different **** *** ** the *********** *** *******."
  • "**% ** *** *** installations ******* ******* ********* Go. ***** ** **** for ***** ** ****** and **** ***** **** a ********."
  • "** *** ******* *** discussions **** **** ********** to **** *** ********* of *** *******"
  • "**-**%. ********* ****** **** the ***** *********** ** unlocking ***** ******** **** their *****."
  • "**% ******** ******** *** mobile ******. ** * feature ** *** ******** (Genetec ******** ******) ********* find **** * ****** feature ** *** ***** they **** ** ******** release * ****"
  • "**% ******* ( ** sell * *** ** Brivo *** ** ** a *** ******* ***** that ********* ***'* **** to ***** **** ******) also ********** ********* **** the ******* ** ***** able ** **** ********** from * ******** *** contractors ** ********."
  • "**%, ******* **'* * great ******* *** ********* has * *****."
  • "****** ****** ****** ********. Users ******* ***** ***** phones ******** **** **."

Upcoming ****** ********

**** *** ********* ******* individual ***** *** **** compare / ***** **** out ******* **** ***** in ****** *****.

***** *** *** ********** test *******:

Comments (4)

** ** ***-****, *** of *** *** ************* include ****** ******* *******.  We **** ********* **** limited ******* **** * select ******** ********** **** positive *******; *******, ** still ******* ********* ** **** and ******* * ********* badge ***** ******* *** benefits ** ***** * mobile **********.  ** ** allow ********* ** **** wearing * ********* *****, we ***** ********** ****** our *******-**-***** ******** ***** there would ** ** ******* ********** between ********** *** ************ personnel ****** *** **********.  If ******* ********** **** an ****** ***** ********* use **** ****** ***********, there ** ** *** to ****** ******** *** unauthorized ********** (****** ***** is * *****, ****-**** employee **********).

** *** ******** ******* for * ******** ** this *****.  ** **** * way ** ******** ****** employee ********** *** ****** while **** *** ****** ****** areas.  ******* **** **********, I ** *** *** mass ******** ** ****** credentials ****** ** ***** with extremely *** ******** ************.

***** *** ****** **. For **** ********* *** difficult ** ********* **** in **** ** * physical ***** *** ** self ******* ************/******** **** stipulate **** ******** ******* visible ***** **. ***** policies ***** ***** ** contractors *** ******* ** well *** **** **** a ********* ***** ** some **** ***** ******. 

* ******* ****** ** the *** ***** ***** to ********* *** ******* benefits ** **** ***** will ** * ******* push ** ***** ***** policies *** ********** ** make **** *** **** if ** * ******* capacity. 

* ****** *** **** respondents **** **** ******** risks **** * ****** for *** ***** ****** credentials *** *****/******* *** kHz ********* *****. 

**** *** ****** ******* about ******** **** ** backwards. **** * ****** few *** '****' ** app, *** ****** *** 'borrow' * *****, *** it's **** ****** ** do ***********.  *** ********* value * ****** *** brings ** **** ***** are *** **** *********** aware ** ***** *****. This ***** *****://***.**********.***/**************/****-********-******-****/**-*************************** ***** **** ***** ****** their ****** *** ***** a *** ** *******,  ******* they ****** **** ***** their ***** **. *** the **** ********** ** the ***** *****'* ** a **** ***** ** help **** ****.

***, ******* ** * mobile ********** ** **** a **** *********** ** short *******. * ***** is * ******** **** knows

- ***** ** **,  it ***** ** **** to ****** ******* ** real ****, ** ******** access ***** ** ********* to *** ******** ***** accessed ** ********** **** door *** ****** ***** to ******.

- *** ******* ********** - ******* *** ** more ****** ************** **** authentication ***** ********** ** the ********** *** ********* biometrics **  * ******/****/**** basis, eliminating *** **** ********* gear ** *** ****.

-*********** - ******* **** notifications (**** ** ******** notifications), *********** **** ****** (silent **** *** ****).

- ****** ***** *** pictures

*** ** **** **** so ***'* **** ******** of * ***** ** a *********** *** * credential *** ***** ********* what ** *** ** with ** ** **** security *******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

New: Mobile Access Proxy Releases 'World's Smallest Mobile Reader' on Mar 04, 2020
Mobile access provider Proxy claims its new Nano is 'the world’s smallest mobile reader' that can be installed into nearly all existing access...
Directory of Access Reader Manufacturers on Nov 27, 2019
Credential Readers are one of the most visible and noticeable parts of access systems, but installers often stick with only the brand they always...
Mobile Access Control Guide on Aug 28, 2019
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. But how does this...
Biometrics Usage Statistics 2019 on Aug 13, 2019
Biometrics are commonly used in phones, but how frequently are they used for access? 150+ integrators told us how often they use biometrics,...
Mobile Access Control Shootout - Farpointe, HID, Openpath, Nortek, Proxy on Jul 29, 2019
One of the biggest rising trends in access control is using phones as credentials but which offering is best? IPVM has tested five of the...
Poor OSDP Usage Statistics 2019 on Jul 09, 2019
OSDP certainly offers advantages over decades-old Wiegand (see our OSDP Access Control Guide) but new IPVM statistics show that usage of OSDP, even...
HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Proxy Access Control Tested on May 09, 2019
Silicon Valley Access Startup Proxy raised $13.6 Million in May 2019, focusing on mobile physical access control. Beyond the fund raising, Proxy...
Startup GateKeeper Aims For Unified Physical / Logical Access Token on Apr 04, 2019
This startup's product claims to 'Kill the Password' you use to keep your computers safe. They have already released their Gatekeeper Halberd...

Most Recent Industry Reports

USA's Feevr Thermal Temperature System Examined on Mar 31, 2020
This US company has burst on to the scene, brashly naming itself 'feevr' and branding itself as a "COVID 19 - AI BASED NON CONTACT THERMAL...
JCI Coronavirus Cuts on Mar 31, 2020
JCI has made coronavirus cuts, the company told employees in an email that IPVM has reviewed. Inside this note, we examine the cuts made, the...
Add Door Operators To Fight Coronavirus on Mar 31, 2020
IPVM recommends that integrators advocate and end-users consider adding door operators to fight the spread of coronavirus. This delivers...
Video Surveillance Business 101 on Mar 30, 2020
This report explains the fundamental elements of the video surveillance business for those new to the industry. This is part of our Video...
FDA Gives Guidance on 'Coronavirus' Thermal Fever Detection Systems on Mar 30, 2020
The US FDA has given IPVM guidance on the use of thermal fever detection systems being marketed for coronavirus, as an explosion of such devices...
Worsen: Integrators Hit Even Harder By Coronavirus on Mar 30, 2020
Integrator's problems have worsened over the past 2 weeks, according to new IPVM survey results. Inside this report, we share statistics and...
Pivot3 Mass Layoffs on Mar 27, 2020
Pivot3 has conducted mass layoffs, the culmination of grand hopes, a quarter of a billion dollars in VC funding, and multiple failures to gain...
Athena CEO Criticizes 'Deplorable' 'Nitpicking', IPVM Refutes on Mar 27, 2020
UPDATE: NBC News Report Cites IPVM On Coronavirus 'Fever Detection' Cameras Athena Security's CEO Lisa Falzone has strongly objected to IPVM's...
Hikvision Admits Sanctions Harming Its Financial Performance on Mar 27, 2020
While Hikvision initially downplayed being sanctioned for human rights abuses, the company is now admitting a significant impact in a new PRC...