Mobile Access Usage Statistics 2019

By: Brian Rhodes, Published on Jul 18, 2019

The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

free image1

150+ integrators told us how often they use mobile access and the 3 key limitations holding back broader use.

*** ******* ** *** ****** phones ** ****** *********** is *** ** *** biggest ****** ** * market **** ************ *** been **** ** ******** new **********.

free image1

***+ *********** **** ** how ***** **** *** mobile ****** *** *** 3 *** *********** ******* back ******* ***.

[***************]

Results **********

********* **** ************** **** integrators '*****' ** ****** deploy ****** ******:

Mobile Access Usage Statistics 2019

*******, **** ~**% **** us **** **** ****** access *** ******** ** the ****, *** ***** overall ****** ** *******, several ******* *** ******* it ****.

Key ********

********* ***** ******** ***** three ******* *** ******** broader ****** ****** ***:

  • ** ******: ********* ** *** have ******** ** ****** or ***** ****** ***********, and *** ******* **** traditional ***********.
  • *** ****** ******: **** ****** ***** have ***** ***** *** secure ****** ****** ** compared ** ******* *******.
  • *** *********: *** ******** ** mobile ** *** ******* the ****, ** **** cases * ****** ** 'extra' **** ******** ** traditional ***********.

** *******, '** ******' and '*** ****** ******' were ********* ****** ******* as *** ******* ******* explaining ****** ****** ********, with '*** *********' ********* as * ******* ***** reason.

No ******

* *** ****** ******** use ** ****** ****** is **** ****** **** end *****. **** *********** told ** **** ***** customers *** *** ****** or ********** ** ******** it ***:

  • "****. ** *** *** requested ** ** **** yet."
  • "*% ******* **** ** people ***'* **** ** install ********* **** ** open *****. ** ****** we ******* ****** ******* using **** ** ***********."
  • "****, *** *** **** requested."
  • "**** - ** ****** from *** ********* *** over ******** **** ***********."
  • "****, *** **** * lot ** ******** ** another ************** ****** ** manage ***** *** ***********."
  • "** **** **** ********* one ****** ** *** past **** **** ****** access. ** ******* *** solution ********* *** **** don’t **** ** *** mobile ***********."
  • "*% ***** **** ***** and ** **** **** see ****** ***** ** it. ** **** ** be ******* **** - not ******** ****!"
  • "****. * ***** **** is **** ** * residential ****** *** ** have ***** **** ***** for **, *** ***** push ** ** * secure ****** ** **** time."
  • "** **** **** *** two ********* ******* ****** access. **** *** **** with *** *** ********* readers. ** **** ** not *** * **** adoption ** **** ********** right ***."
  • "** *** ***; ***** 10%. *** ******** *** interested *** * ***** it *** **** ******* it *** **** ****** intent ** ***. **** two ********* **** * have **** ******** **** are ******** ***** *** technology."
  • "**** ***. ** ** an ****** **** ** provided, *** ******* ****** request/use *** *******."
  • "*%. *** **** **** via ************ ** *** client. ******** ** **** asked ** ***** ****** access *** *****-*** ********. Otherwise ***** *** **** no ********."

* ************ ****** ** weak ****** ** *** all ****** ************* ******* a ****** ********, *** even ***** **** ** often ** *** ******* promote ** ***** *** users. **** ***** *** party ******/ ******** *******, product ********* ** ********* marketed ** ***********. **** more ******* ******* ******, and **** **** **** to ****** ***** ********* to *** ******, ****** will ****** ********.

*******, ** ******** ** following ******** **********, ******** barriers ** '********' *** 'cost' *** ** ******* or **** ****** **** time, *** ***** ******* coupled **** *** '*******' of ****** ****** ** too ***** *** **** access ****** ** ******** yet.

Not ****** ******

**** *********** *** ***-***** are ********* ***** *** security ** ****** ****** systems, ************* *****, *** end-user ***** ******** ************ into ******** **** ****** systems:

  • "**% ***. *** **** users (****) ***'* **** to **** ** *********, for **** ******** *******."
  • "** ***** ****** *** to *** *** ********* but **** ***'* **** safe ****** *** ******* to ****** * ****** door **** ***** **** though *** ***** **** to ****** ***** **** enter * **** **** and ******** **** ****** app ** ******** *** to *** ******* ** you *** ****** *** door."
  • "**** ** *** ****** control ******* *** ******* and ******* **********. *** medical ********** ******* ** to **** *** ****** isolated. ******* ****** **** only."
  • "****. ****** ****** *****, business **** **** ******* over ***** ******."
  • "*%. ** *** ********* a ******* ********** **********. Though ** **** ****** with **** ********* ***** derived ***********, ** **** to *** *** ********, and ***** *******, ** use **** ********* (*** at *** ******) ****** we *** ****** ****** mobile ***********."
  • "**%. ** ***** ** closer ** ***% *** our ********** *********, *** we ** ****** *******."
  • "**** *** ***. *** reason ** *******, ***** is ***** ********"
  • "****. **'** *** **** executive ******** ******** ** this **** ********* *** in *** *** *** testing ***** ****** *** customers ***** **** *** a ******** **** ** phone ** ****** ** apps ******. "
  • "*%. ** ***'* **** that **** ** ******* yet *** ** *** exploring **. **** ** be **** ** ** secure."
  • "***, ******* ********* ***** security *******"
  • "****. ********* *** *** convinced **** ******** ******* are ******."

**** ** ***** ******** share **** ****** ****** is *** ********* ** market-specific ******** **************, ******* showing **** *****-***** *********** are *** ****** * good *** *** **********, high-security, *** ************* *********. 

Too *********

* *********** ******* ** wider ****** *** ** higher ****, **** ** terms ** ****** ********** and ************** **** ******** to *********** ******** ***** and ****.

  • "*% **** ******** ********** subscriptions *** ******* *********, and *** *** ********* use ***********."
  • "**% ***** *** *** cost ** * *** factor."
  • "****. *** ******* *** purchasing ************ **** ** be *********** ** *** customers. **** **** ******** to ******** *** **** mobile *********** ** *** time. *** **** **** they ******. "
  • "** *** **** *** credentials **** *** ************ which ****** ****** ** the *** **** **** their ********* **** ** upgraded ***** ******."
  • "**** **** *% - the ****** ** *** complexity ** ******** ****** credentials *** ***** ****** cost ******** ** ******** credentials(cards, ****, ***)"
  • "**** ** * ******* of *** ****** ** provide ********* * ****** readers. *** *** ***** installed **** **** ******* but ** *** *** to ******** *** ******* in * ***** ***** usually *** ******** ** facility ******** ****** ****. The ********* **** ** a ****** ********** ** difficult ** **** ** customers."
  • "* ***** **** ** it ***** ** *** cost ** *** *** time ********** **** ** tied ** *** *****."
  • "*% **** **** **** & *** *********** *** expensive."
  • "** **** **** *%. Customers ***'* **** ** pay *** *** ********, and **** ***'* **** to ********** *** *******. Unfortunately, ** **** *** made *** ********** ** manage ** *** **** and **** *** *** because ** ***'* **** the *********."
  • "*. **'* * ***** pain *** **** *********. I *** **** ** to * ****** *** open *** **** ** under * ****** **** a ****. * ****** credential ** * ****. I ** **** ** phone ***, ****** **, find *** ***, *** into *** ***, **** the ***** ****, **** sure ** ********* ** on (******* **'* *** to **** *******, **** open *** ****."
  • "*% *** **** ****** access *********** ******* ** the ********** ***** *** the ******* *** ****."

** *******, *** **** of ******-***** ******* *** similar ** *********** ***** of '***-******' *****, *** we ****** ****** ****** mortality *** ********* ** result ** **** '****** ready' ******* ** ****** years.

*******, **** *** ********** incumbents **** ***, ******* for ****** *** * problem. *** ******** ******** mobile ********** ******* ** be * ****, '*** user' ******* **** **** the ****** ** ***** (*** **** ****: *** ****** ******), ******* **** ****** access ******* **** ***** to **** ****** *********** using *** **** ***** as ******** *****, ** a '*** *****', *** device *****.

Systems *** ***** ****** *****, *** ******

*************, **** ***** **** even ***** ****** ****** adoption ** ***, **** already **** ******** *** capability ** *** ******* they ****.

*** ****** ********* ** 'mobile ****** ** ***** when ***** ***' ** internal ******** ** ****** use *** ********** ** change.

  • "****** *** *** ******* included ******-***** *******. **** about *% ** *** customers *** ******** ***** the ****** *********** *** they **** ** ** ready *** **** **** decide ** **** ** out."
  • "** *** ******** ** if *** ******* ********* have *** **********, *********** 95% ** ****. ** the ******** ** *** many *** ******** *****, 10%. ***** * *** talking ***** ** *** sales *****, ** ****** gets *********** *** ** the ********* ********** ** go ******* **** *** extra ************* *** ****** of ****** ***********. ******** understands *********** *****/****."
  • "*** ** *** ******* now **** *** ********** through ** *** *** user ******** *** **** light. *** ** *** customers *** ********** ** using ***** ****** ** credentials. **** ***'* **** to *** ***** ******** phones *** ****."
  • "***% *********, ***** **% adoption"
  • "** ** *** * regularly ********* ******* **** our ****** ******* ****. It ***** **** *** DSX ******* ******** *****. But ****** ** ** have ********* ********** ** utilizing **."
  • "**** **** *%, ****** is **** ********, * have ********* **** **** purchased ****** ***** *******, but *** ***** ***** cards"
  • "** *** ** ****** dealer *** **** ******* is *****-** ** *** RC-04 ** ** ** available ** ***** *** percent ** *** ************* and ** **** **** it ********* ** ***** 50 ******* ** *** applications. ** **** ** a ***** ******* *******."
  • "*** ** *** *** install ******** ****** *************** for *** ***** ******* very *** ********* ******** use **** ** *** mindset ** ******** ***** force **** ** *** standard *********** ***** ********* specific *****."
  • "***% *** ** *** systems **** ** ******* can ****** ***** *** customers *****, *** **** about **% ** **** actually *** *** *******."

Strong ******* *******

******* ****** *** ** widely ******* *** ***, a ******* ****** ** high-percentage ***** ************ ********* the ******* ****** ** the *******.

******, ***** *********** **** that ****** ****** * new ********* ************** ********** to ******* ** *** typically *** **************, ****-********* access ******:

  • "*** *** **** **** it ** * *********** for *** ******** ** unlock ********. **’* * good ******* ***** ** well **** *********."
  • "***%. ** ** **** to **** **** ********** access."
  • "****** ***** ****** ***** phone *** *** ********* different **** *** ** the *********** *** *******."
  • "**% ** *** *** installations ******* ******* ********* Go. ***** ** **** for ***** ** ****** and **** ***** **** a ********."
  • "** *** ******* *** discussions **** **** ********** to **** *** ********* of *** *******"
  • "**-**%. ********* ****** **** the ***** *********** ** unlocking ***** ******** **** their *****."
  • "**% ******** ******** *** mobile ******. ** * feature ** *** ******** (Genetec ******** ******) ********* find **** * ****** feature ** *** ***** they **** ** ******** release * ****"
  • "**% ******* ( ** sell * *** ** Brivo *** ** ** a *** ******* ***** that ********* ***'* **** to ***** **** ******) also ********** ********* **** the ******* ** ***** able ** **** ********** from * ******** *** contractors ** ********."
  • "**%, ******* **'* * great ******* *** ********* has * *****."
  • "****** ****** ****** ********. Users ******* ***** ***** phones ******** **** **."

Upcoming ****** ********

**** *** ********* ******* individual ***** *** **** compare / ***** **** out ******* **** ***** in ****** *****.

***** *** *** ********** test *******:

Comments (4)

** ** ***-****, *** of *** *** ************* include ****** ******* *******.  We **** ********* **** limited ******* **** * select ******** ********** **** positive *******; *******, ** still ******* ********* ** **** and ******* * ********* badge ***** ******* *** benefits ** ***** * mobile **********.  ** ** allow ********* ** **** wearing * ********* *****, we ***** ********** ****** our *******-**-***** ******** ***** there would ** ** ******* ********** between ********** *** ************ personnel ****** *** **********.  If ******* ********** **** an ****** ***** ********* use **** ****** ***********, there ** ** *** to ****** ******** *** unauthorized ********** (****** ***** is * *****, ****-**** employee **********).

** *** ******** ******* for * ******** ** this *****.  ** **** * way ** ******** ****** employee ********** *** ****** while **** *** ****** ****** areas.  ******* **** **********, I ** *** *** mass ******** ** ****** credentials ****** ** ***** with extremely *** ******** ************.

***** *** ****** **. For **** ********* *** difficult ** ********* **** in **** ** * physical ***** *** ** self ******* ************/******** **** stipulate **** ******** ******* visible ***** **. ***** policies ***** ***** ** contractors *** ******* ** well *** **** **** a ********* ***** ** some **** ***** ******. 

* ******* ****** ** the *** ***** ***** to ********* *** ******* benefits ** **** ***** will ** * ******* push ** ***** ***** policies *** ********** ** make **** *** **** if ** * ******* capacity. 

* ****** *** **** respondents **** **** ******** risks **** * ****** for *** ***** ****** credentials *** *****/******* *** kHz ********* *****. 

**** *** ****** ******* about ******** **** ** backwards. **** * ****** few *** '****' ** app, *** ****** *** 'borrow' * *****, *** it's **** ****** ** do ***********.  *** ********* value * ****** *** brings ** **** ***** are *** **** *********** aware ** ***** *****. This ***** *****://***.**********.***/**************/****-********-******-****/**-*************************** ***** **** ***** ****** their ****** *** ***** a *** ** *******,  ******* they ****** **** ***** their ***** **. *** the **** ********** ** the ***** *****'* ** a **** ***** ** help **** ****.

***, ******* ** * mobile ********** ** **** a **** *********** ** short *******. * ***** is * ******** **** knows

- ***** ** **,  it ***** ** **** to ****** ******* ** real ****, ** ******** access ***** ** ********* to *** ******** ***** accessed ** ********** **** door *** ****** ***** to ******.

- *** ******* ********** - ******* *** ** more ****** ************** **** authentication ***** ********** ** the ********** *** ********* biometrics **  * ******/****/**** basis, eliminating *** **** ********* gear ** *** ****.

-*********** - ******* **** notifications (**** ** ******** notifications), *********** **** ****** (silent **** *** ****).

- ****** ***** *** pictures

*** ** **** **** so ***'* **** ******** of * ***** ** a *********** *** * credential *** ***** ********* what ** *** ** with ** ** **** security *******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...
Access Control Course Fall 2019 - Last Chance on Oct 17, 2019
Register Now - Fall 2019 Access Control Course. Thursday, October 17th is the last day to register. IPVM offers the most comprehensive access...
Altronix Claims Tango 'Eliminates Electricians' on Oct 15, 2019
Power supply provider Altronix claims its new Tango power supply 'eliminates the need for an electrician, dedicated conduit and wire runs'. In...
Pelco CEO Out, New CEO Found on Oct 15, 2019
Just 2 months after Pelco was sold, Pelco's CEO is out, with Pelco bringing in an outside President and searching for a new CEO from the industry,...
HID Fingerprint Reader Tested on Oct 09, 2019
HID has released their first access reader to use Lumidigm optical sensors, that touts it 'works with anyone, anytime, anywhere'. We bought and...
Fail Safe vs. Fail Secure Tutorial on Oct 02, 2019
Few terms carry greater importance in access control than 'fail safe' and 'fail secure'. Access control professionals must know how these...
Access Control Mustering Guide on Sep 30, 2019
In emergencies, determining where employees are located can be critical for knowing whether they are in danger. Access systems can be used for...
Access Control Mantraps Guide on Sep 26, 2019
One of access's primary goals is keeping people out of places they should not be, but slipping through open doors (ie: Tailgating) is often...
Access Control Time & Attendance Guide on Sep 24, 2019
Access control systems can do more than lock doors. With little or no extra equipment, they can be used to track labor hours for employees...
Open Access Controller Guide (Axis, HID, Isonas, Mercury) on Sep 19, 2019
In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers. Recently,...

Most Recent Industry Reports

US DoD Comments on Huawei, Hikvision, Dahua Cyber Security Concerns on Oct 16, 2019
A senior DoD official said the US is "concerned" with the cybersecurity of Hikvision, Dahua, and Huawei due to "CCP" (China Communist Party)...
Pelco Sarix Pro3 Camera Tested on Oct 16, 2019
Pelco has released their Sarix Professional Series 3 cameras, claiming "more security detail in challenging scenes with excellent low light and...
IPVM Camera Calculator User Manual / Guide on Oct 16, 2019
Learn how to use the IPVM Camera Calculator. The guide below includes instructions, images, gifs, and videos demonstrating and explaining the...
Altronix Claims Tango 'Eliminates Electricians' on Oct 15, 2019
Power supply provider Altronix claims its new Tango power supply 'eliminates the need for an electrician, dedicated conduit and wire runs'. In...
Pelco CEO Out, Seeking New Industry CEO, New CEO Found on Oct 15, 2019
Just 2 months after Pelco was sold, Pelco's CEO is out, with Pelco bringing in an outside President and searching for a new CEO from the industry,...
Hikvision Dissolves North American Business Unit, Splits Canada and USA on Oct 15, 2019
Hikvision has dissolved its North American Business Unit, splitting up US and Canada operations as the PRC-government owned manufacturer faces...
Camera Focusing Tutorial on Oct 14, 2019
Camera focus is fundamental to quality imaging. Mistakes can significantly reduce details, making cameras less effective. In this guide, we...
"UL Has Blood On Their Hands" Alleges The Interceptor / Keith Jentoft on Oct 14, 2019
"UL has blood on their hands" alleges Keith Jentoft of "The Interceptor Project". We examined The Interceptor in-depth last year, see: The...
Access Control Course Fall 2019 - Last Chance on Oct 14, 2019
Register Now - Fall 2019 Access Control Course. Thursday, October 17th is the last day to register. IPVM offers the most comprehensive access...
Axis HD Analog Encoder Tested on Oct 11, 2019
Two years after declaring "Everything is IP", Axis has released their first HD analog encoder, the P7304, with support for AHD, CVI, TVI, and SD...