Mobile Access Usage Statistics 2019

By: Brian Rhodes, Published on Jul 18, 2019

The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

free image1

150+ integrators told us how often they use mobile access and the 3 key limitations holding back broader use.

Results **********

********* **** ************** **** integrators '*****' ** ****** deploy ****** ******:

Mobile Access Usage Statistics 2019

*******, **** ~**% **** us **** **** ****** access *** ******** ** the ****, *** ***** overall ****** ** *******, several ******* *** ******* it ****.

Key ********

********* ***** ******** ***** three ******* *** ******** broader ****** ****** ***:

  • ** ******: ********* ** *** have ******** ** ****** or ***** ****** ***********, and *** ******* **** traditional ***********.
  • *** ****** ******: **** ****** ***** have ***** ***** *** secure ****** ****** ** compared ** ******* *******.
  • *** *********: *** ******** ** mobile ** *** ******* the ****, ** **** cases * ****** ** 'extra' **** ******** ** traditional ***********.

** *******, '** ******' and '*** ****** ******' were ********* ****** ******* as *** ******* ******* explaining ****** ****** ********, with '*** *********' ********* as * ******* ***** reason.

No ******

* *** ****** ******** use ** ****** ****** is **** ****** **** end *****. **** *********** told ** **** ***** customers *** *** ****** or ********** ** ******** it ***:

  • "****. ** *** *** requested ** ** **** yet."
  • "*% ******* **** ** people ***'* **** ** install ********* **** ** open *****. ** ****** we ******* ****** ******* using **** ** ***********."
  • "****, *** *** **** requested."
  • "**** - ** ****** from *** ********* *** over ******** **** ***********."
  • "****, *** **** * lot ** ******** ** another ************** ****** ** manage ***** *** ***********."
  • "** **** **** ********* one ****** ** *** past **** **** ****** access. ** ******* *** solution ********* *** **** don’t **** ** *** mobile ***********."
  • "*% ***** **** ***** and ** **** **** see ****** ***** ** it. ** **** ** be ******* **** - not ******** ****!"
  • "****. * ***** **** is **** ** * residential ****** *** ** have ***** **** ***** for **, *** ***** push ** ** * secure ****** ** **** time."
  • "** **** **** *** two ********* ******* ****** access. **** *** **** with *** *** ********* readers. ** **** ** not *** * **** adoption ** **** ********** right ***."
  • "** *** ***; ***** 10%. *** ******** *** interested *** * ***** it *** **** ******* it *** **** ****** intent ** ***. **** two ********* **** * have **** ******** **** are ******** ***** *** technology."
  • "**** ***. ** ** an ****** **** ** provided, *** ******* ****** request/use *** *******."
  • "*%. *** **** **** via ************ ** *** client. ******** ** **** asked ** ***** ****** access *** *****-*** ********. Otherwise ***** *** **** no ********."

* ************ ****** ** weak ****** ** *** all ****** ************* ******* a ****** ********, *** even ***** **** ** often ** *** ******* promote ** ***** *** users. **** ***** *** party ******/ ******** *******, product ********* ** ********* marketed ** ***********. **** more ******* ******* ******, and **** **** **** to ****** ***** ********* to *** ******, ****** will ****** ********.

*******, ** ******** ** following ******** **********, ******** barriers ** '********' *** 'cost' *** ** ******* or **** ****** **** time, *** ***** ******* coupled **** *** '*******' of ****** ****** ** too ***** *** **** access ****** ** ******** yet.

Not ****** ******

**** *********** *** ***-***** are ********* ***** *** security ** ****** ****** systems, ************* *****, *** end-user ***** ******** ************ into ******** **** ****** systems:

  • "**% ***. *** **** users (****) ***'* **** to **** ** *********, for **** ******** *******."
  • "** ***** ****** *** to *** *** ********* but **** ***'* **** safe ****** *** ******* to ****** * ****** door **** ***** **** though *** ***** **** to ****** ***** **** enter * **** **** and ******** **** ****** app ** ******** *** to *** ******* ** you *** ****** *** door."
  • "**** ** *** ****** control ******* *** ******* and ******* **********. *** medical ********** ******* ** to **** *** ****** isolated. ******* ****** **** only."
  • "****. ****** ****** *****, business **** **** ******* over ***** ******."
  • "*%. ** *** ********* a ******* ********** **********. Though ** **** ****** with **** ********* ***** derived ***********, ** **** to *** *** ********, and ***** *******, ** use **** ********* (*** at *** ******) ****** we *** ****** ****** mobile ***********."
  • "**%. ** ***** ** closer ** ***% *** our ********** *********, *** we ** ****** *******."
  • "**** *** ***. *** reason ** *******, ***** is ***** ********"
  • "****. **'** *** **** executive ******** ******** ** this **** ********* *** in *** *** *** testing ***** ****** *** customers ***** **** *** a ******** **** ** phone ** ****** ** apps ******. "
  • "*%. ** ***'* **** that **** ** ******* yet *** ** *** exploring **. **** ** be **** ** ** secure."
  • "***, ******* ********* ***** security *******"
  • "****. ********* *** *** convinced **** ******** ******* are ******."

**** ** ***** ******** share **** ****** ****** is *** ********* ** market-specific ******** **************, ******* showing **** *****-***** *********** are *** ****** * good *** *** **********, high-security, *** ************* *********.

Too *********

* *********** ******* ** wider ****** *** ** higher ****, **** ** terms ** ****** ********** and ************** **** ******** to *********** ******** ***** and ****.

  • "*% **** ******** ********** subscriptions *** ******* *********, and *** *** ********* use ***********."
  • "**% ***** *** *** cost ** * *** factor."
  • "****. *** ******* *** purchasing ************ **** ** be *********** ** *** customers. **** **** ******** to ******** *** **** mobile *********** ** *** time. *** **** **** they ******. "
  • "** *** **** *** credentials **** *** ************ which ****** ****** ** the *** **** **** their ********* **** ** upgraded ***** ******."
  • "**** **** *% - the ****** ** *** complexity ** ******** ****** credentials *** ***** ****** cost ******** ** ******** credentials(cards, ****, ***)"
  • "**** ** * ******* of *** ****** ** provide ********* * ****** readers. *** *** ***** installed **** **** ******* but ** *** *** to ******** *** ******* in * ***** ***** usually *** ******** ** facility ******** ****** ****. The ********* **** ** a ****** ********** ** difficult ** **** ** customers."
  • "* ***** **** ** it ***** ** *** cost ** *** *** time ********** **** ** tied ** *** *****."
  • "*% **** **** **** & *** *********** *** expensive."
  • "** **** **** *%. Customers ***'* **** ** pay *** *** ********, and **** ***'* **** to ********** *** *******. Unfortunately, ** **** *** made *** ********** ** manage ** *** **** and **** *** *** because ** ***'* **** the *********."
  • "*. **'* * ***** pain *** **** *********. I *** **** ** to * ****** *** open *** **** ** under * ****** **** a ****. * ****** credential ** * ****. I ** **** ** phone ***, ****** **, find *** ***, *** into *** ***, **** the ***** ****, **** sure ** ********* ** on (******* **'* *** to **** *******, **** open *** ****."
  • "*% *** **** ****** access *********** ******* ** the ********** ***** *** the ******* *** ****."

** *******, *** **** of ******-***** ******* *** similar ** *********** ***** of '***-******' *****, *** we ****** ****** ****** mortality *** ********* ** result ** **** '****** ready' ******* ** ****** years.

*******, **** *** ********** incumbents **** ***, ******* for ****** *** * problem. *** ******** ******** mobile ********** ******* ** be * ****, '*** user' ******* **** **** the ****** *******(*** **** ****:*** ****** ******), ******* **** ****** access ******* **** ***** to **** ****** *********** using *** **** ***** as ******** *****, ** a '*** *****', *** device *****.

Systems *** ***** ****** *****, *** ******

*************, **** ***** **** even ***** ****** ****** adoption ** ***, **** already **** ******** *** capability ** *** ******* they ****.

*** ****** ********* ** 'mobile ****** ** ***** when ***** ***' ** internal ******** ** ****** use *** ********** ** change.

  • "****** *** *** ******* included ******-***** *******. **** about *% ** *** customers *** ******** ***** the ****** *********** *** they **** ** ** ready *** **** **** decide ** **** ** out."
  • "** *** ******** ** if *** ******* ********* have *** **********, *********** 95% ** ****. ** the ******** ** *** many *** ******** *****, 10%. ***** * *** talking ***** ** *** sales *****, ** ****** gets *********** *** ** the ********* ********** ** go ******* **** *** extra ************* *** ****** of ****** ***********. ******** understands *********** *****/****."
  • "*** ** *** ******* now **** *** ********** through ** *** *** user ******** *** **** light. *** ** *** customers *** ********** ** using ***** ****** ** credentials. **** ***'* **** to *** ***** ******** phones *** ****."
  • "***% *********, ***** **% adoption"
  • "** ** *** * regularly ********* ******* **** our ****** ******* ****. It ***** **** *** DSX ******* ******** *****. But ****** ** ** have ********* ********** ** utilizing **."
  • "**** **** *%, ****** is **** ********, * have ********* **** **** purchased ****** ***** *******, but *** ***** ***** cards"
  • "** *** ** ****** dealer *** **** ******* is *****-** ** *** RC-04 ** ** ** available ** ***** *** percent ** *** ************* and ** **** **** it ********* ** ***** 50 ******* ** *** applications. ** **** ** a ***** ******* *******."
  • "*** ** *** *** install ******** ****** *************** for *** ***** ******* very *** ********* ******** use **** ** *** mindset ** ******** ***** force **** ** *** standard *********** ***** ********* specific *****."
  • "***% *** ** *** systems **** ** ******* can ****** ***** *** customers *****, *** **** about **% ** **** actually *** *** *******."

Strong ******* *******

******* ****** *** ** widely ******* *** ***, a ******* ****** ** high-percentage ***** ************ ********* the ******* ****** ** the *******.

******, ***** *********** **** that ****** ****** * new ********* ************** ********** to ******* ** *** typically *** **************, ****-********* access ******:

  • "*** *** **** **** it ** * *********** for *** ******** ** unlock ********. **’* * good ******* ***** ** well **** *********."
  • "***%. ** ** **** to **** **** ********** access."
  • "****** ***** ****** ***** phone *** *** ********* different **** *** ** the *********** *** *******."
  • "**% ** *** *** installations ******* ******* ********* Go. ***** ** **** for ***** ** ****** and **** ***** **** a ********."
  • "** *** ******* *** discussions **** **** ********** to **** *** ********* of *** *******"
  • "**-**%. ********* ****** **** the ***** *********** ** unlocking ***** ******** **** their *****."
  • "**% ******** ******** *** mobile ******. ** * feature ** *** ******** (Genetec ******** ******) ********* find **** * ****** feature ** *** ***** they **** ** ******** release * ****"
  • "**% ******* ( ** sell * *** ** Brivo *** ** ** a *** ******* ***** that ********* ***'* **** to ***** **** ******) also ********** ********* **** the ******* ** ***** able ** **** ********** from * ******** *** contractors ** ********."
  • "**%, ******* **'* * great ******* *** ********* has * *****."
  • "****** ****** ****** ********. Users ******* ***** ***** phones ******** **** **."

Upcoming ****** ********

**** *** ********* ******* individual ***** *** **** compare / ***** **** out ******* **** ***** in ****** *****.

***** *** *** ********** test *******:

Comments (4)

** ** ***-****, *** of *** *** ************* include ****** ******* *******.  We **** ********* **** limited ******* **** * select ******** ********** **** positive *******; *******, ** still ******* ********* ** **** and ******* * ********* badge ***** ******* *** benefits ** ***** * mobile **********.  ** ** allow ********* ** **** wearing * ********* *****, we ***** ********** ****** our *******-**-***** ******** ***** there would ** ** ******* ********** between ********** *** ************ personnel ****** *** **********.  If ******* ********** **** an ****** ***** ********* use **** ****** ***********, there ** ** *** to ****** ******** *** unauthorized ********** (****** ***** is * *****, ****-**** employee **********).

** *** ******** ******* for * ******** ** this *****.  ** **** * way ** ******** ****** employee ********** *** ****** while **** *** ****** ****** areas.  ******* **** **********, I ** *** *** mass ******** ** ****** credentials ****** ** ***** with extremely *** ******** ************.

***** *** ****** **. For **** ********* *** difficult ** ********* **** in **** ** * physical ***** *** ** self ******* ************/******** **** stipulate **** ******** ******* visible ***** **. ***** policies ***** ***** ** contractors *** ******* ** well *** **** **** a ********* ***** ** some **** ***** ******. 

* ******* ****** ** the *** ***** ***** to ********* *** ******* benefits ** **** ***** will ** * ******* push ** ***** ***** policies *** ********** ** make **** *** **** if ** * ******* capacity. 

* ****** *** **** respondents **** **** ******** risks **** * ****** for *** ***** ****** credentials *** *****/******* *** kHz ********* *****. 

**** *** ****** ******* about ******** **** ** backwards. **** * ****** few *** '****' ** app, *** ****** *** 'borrow' * *****, *** it's **** ****** ** do ***********.  *** ********* value * ****** *** brings ** **** ***** are *** **** *********** aware ** ***** *****. This ***** *****://***.**********.***/**************/****-********-******-****/**-*************************** ***** **** ***** ****** their ****** *** ***** a *** ** *******,  ******* they ****** **** ***** their ***** **. *** the **** ********** ** the ***** *****'* ** a **** ***** ** help **** ****.

***, ******* ** * mobile ********** ** **** a **** *********** ** short *******. * ***** is * ******** **** knows

- ***** ** **,  it ***** ** **** to ****** ******* ** real ****, ** ******** access ***** ** ********* to *** ******** ***** accessed ** ********** **** door *** ****** ***** to ******.

- *** ******* ********** - ******* *** ** more ****** ************** **** authentication ***** ********** ** the ********** *** ********* biometrics **  * ******/****/**** basis, eliminating *** **** ********* gear ** *** ****.

-*********** - ******* **** notifications (**** ** ******** notifications), *********** **** ****** (silent **** *** ****).

- ****** ***** *** pictures

*** ** **** **** so ***'* **** ******** of * ***** ** a *********** *** * credential *** ***** ********* what ** *** ** with ** ** **** security *******.

Login to read this IPVM report.

Related Reports

Facial Recognition: Weak Sales, Anti Regulation, No Favorite, Says Security Integrators on Jul 07, 2020
While facial recognition has gained greater prominence, a new IPVM study of...
Fever Camera Sales From Integrators Surveyed on Jun 01, 2020
Fever cameras are the hottest trend in video surveillance currently but how...
Beware Of Feevr on Apr 14, 2020
Beware of "Feevr". The company is marketing a 'Feevr' solution that...
The US Fight Over Facial Recognition Explained on Jul 08, 2020
The controversy around facial recognition has grown significantly in 2020,...
Pivot3 Mass Layoffs on Mar 27, 2020
Pivot3 has conducted mass layoffs, the culmination of grand hopes, a quarter...
Dynamic vs Static IP Addresses Tutorial on Apr 16, 2020
While many cameras default to DHCP out of the box, that does not mean you...
Access Visitor Management Systems Guide on Jul 22, 2020
"Who are you, and why are you here?" Facilities that implement Visitor...
Favorite Access Control Credentials 2020 on Sep 15, 2020
Credential choice is more debated than ever, with hacking risk for 125kHz and...
Injes Tiny Temperature Terminal Tested on Jul 17, 2020
While temperature terminals have trended bigger, the Injes DFace801 is...
Manufacturers Not Interested in October 2020 ISC West Show on Apr 13, 2020
Manufacturers overwhelmingly say they are not interested in going to the...
Worst Camera Manufacturers 2020 on May 06, 2020
Which camera manufacturer have integrators had the worst experience with in...
Faked Coronavirus Fever Detection, Athena Used Hikvision; Responds - Selling NDAA Compliant Cameras, Pledging 50% Of Profits to Victims on Mar 24, 2020
US company, Athena Security, faked its coronavirus fever detection marketing,...
Verkada: "IPVM Should Never Be Your Source of News" on Jul 02, 2020
Verkada was unhappy with IPVM's recent coverage declaring that reading IPVM...
Manufacturers Doing Better Than Expected Against Coronavirus on May 05, 2020
Coronavirus impacts are not hitting manufacturers as badly as they feared,...
Beware Rigged China Fever Cameras on Sep 08, 2020
Many China fever camera manufacturers have rigged algorithms dynamically...

Recent Reports

Virtual ISC West and GSX+ Exhibiting Contrasted on Sep 17, 2020
Both ISC West and ASIS GSX are going virtual this year, just weeks apart, but...
X.Labs Sues FLIR on Sep 16, 2020
X.Labs, the maker of Feevr, has sued FLIR, the publicly traded thermal...
Video Surveillance 101 September Course - Last Chance on Sep 16, 2020
Today is the last chance to sign up for the Fall Video Surveillance 101...
No Blackbody Mistake, Half Million Dollar, Hikvision Fever Camera System in Georgia on Sep 16, 2020
A Georgia school district touted buying Hikvision fever screening "about...
Costar Technologies / Arecont H1 2020 Financials Examined on Sep 16, 2020
Costar's financial results have been hit by the coronavirus with the company...
Startup Cawamo Presents Live Alerts With Edge AI and Cloud VMS on Sep 15, 2020
Cawamo, an Israeli edge-to-cloud analytics and VMS startup, presented its...
Favorite Access Control Credentials 2020 on Sep 15, 2020
Credential choice is more debated than ever, with hacking risk for 125kHz and...
Dangerous Hikvision Fever Screening Marketing In Africa on Sep 15, 2020
A multi-national African Hikvision distributor is marketing dangerously...
New Products Show Fall 2020 Announced - Register Now on Sep 14, 2020
IPVM's sixth online show will feature New Products from over 25...
Hanwha 8K / 33MP Camera Tested on Sep 14, 2020
Hanwha Techwin has released an 8K / 33MP resolution camera, the TNB-9000 with...
Gait Recognition Examined on Sep 14, 2020
Facial recognition faces increasing ethical and political criticisms while...
Comparing 2020 Reality To 2010 Expectations on Sep 11, 2020
What can we learn from where the industry was in 2010 and what was believed...
China Dali Fever Cameras and Booming Sales Examined on Sep 11, 2020
Zhejiang Dali, one of China's original thermal technology developers, has...
Risks Of Managing End User Passwords (Statistics) 2020 on Sep 11, 2020
Alarmingly, most integrators used spreadsheets to manage passwords, IPVM...
Dedicated Vs Converged IP Video Networks Statistics 2020 on Sep 10, 2020
Running one's video system on a converged network with other devices can save...