Mobile Access Usage Statistics 2019

Published Jul 18, 2019 13:19 PM

The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

free image1

150+ integrators told us how often they use mobile access and the 3 key limitations holding back broader use.

Results **********

********* **** ************** **** *********** '*****' or ****** ****** ****** ******:

Mobile Access Usage Statistics 2019

*******, **** ~**% **** ** **** sell ****** ****** *** ******** ** the ****, *** ***** ******* ****** is *******, ******* ******* *** ******* it ****.

Key ********

********* ***** ******** ***** ***** ******* are ******** ******* ****** ****** ***:

  • ** ******: ********* ** *** **** ******** in ****** ** ***** ****** ***********, and *** ******* **** *********** ***********.
  • *** ****** ******: **** ****** ***** **** ***** about *** ****** ****** ****** ** compared ** ******* *******.
  • *** *********: *** ******** ** ****** ** not ******* *** ****, ** **** cases * ****** ** '*****' **** compared ** *********** ***********.

** *******, '** ******' *** '*** Secure ******' **** ********* ****** ******* as *** ******* ******* ********** ****** access ********, **** '*** *********' ********* as * ******* ***** ******.

No ******

* *** ****** ******** *** ** mobile ****** ** **** ****** **** end *****. **** *********** **** ** that ***** ********* *** *** ****** or ********** ** ******** ** ***:

  • "****. ** *** *** ********* ** in **** ***."
  • "*% ******* **** ** ****** ***'* want ** ******* ********* **** ** open *****. ** ****** ** ******* access ******* ***** **** ** ***********."
  • "****, *** *** **** *********."
  • "**** - ** ****** **** *** customers *** **** ******** **** ***********."
  • "****, *** **** * *** ** interest ** ******* ************** ****** ** manage ***** *** ***********."
  • "** **** **** ********* *** ****** in *** **** **** **** ****** access. ** ******* *** ******** ********* but **** ***’* **** ** *** mobile ***********."
  • "*% ***** **** ***** *** ** this **** *** ****** ***** ** it. ** **** ** ** ******* edge - *** ******** ****!"
  • "****. * ***** **** ** **** of * *********** ****** *** ** have ***** **** ***** *** **, nor ***** **** ** ** * secure ****** ** **** ****."
  • "** **** **** *** *** ********* request ****** ******. **** *** **** with *** *** ********* *******. ** just ** *** *** * **** adoption ** **** ********** ***** ***."
  • "** *** ***; ***** **%. *** customer *** ********** *** * ***** it *** **** ******* ** *** than ****** ****** ** ***. **** two ********* **** * **** **** involved **** *** ******** ***** *** technology."
  • "**** ***. ** ** ** ****** that ** ********, *** ******* ****** request/use *** *******."
  • "*%. *** **** **** *** ************ or *** ******. ******** ** **** asked ** ***** ****** ****** *** multi-use ********. ********* ***** *** **** no ********."

* ************ ****** ** **** ****** is *** *** ****** ************* ******* a ****** ********, *** **** ***** that ** ***** ** *** ******* promote ** ***** *** *****. **** among *** ***** ******/ ******** *******, product ********* ** ********* ******** ** integrators. **** **** ******* ******* ******, and **** **** **** ** ****** their ********* ** *** ******, ****** will ****** ********.

*******, ** ******** ** ********* ******** illustrate, ******** ******** ** '********' *** 'cost' *** ** ******* ** **** potent **** ****, *** ***** ******* coupled **** *** '*******' ** ****** simply ** *** ***** *** **** access ****** ** ******** ***.

Not ****** ******

**** *********** *** ***-***** *** ********* about *** ******** ** ****** ****** systems, ************* *****, *** ***-**** ***** security ************ **** ******** **** ****** systems:

  • "**% ***. *** **** ***** (****) don't **** ** **** ** *********, for **** ******** *******."
  • "** ***** ****** *** ** *** our ********* *** **** ***'* **** safe ****** *** ******* ** ****** a ****** **** **** ***** **** though *** ***** **** ** ****** phone **** ***** * **** **** and ******** **** ****** *** ** actually *** ** *** ******* ** you *** ****** *** ****."
  • "**** ** *** ****** ******* ******* are ******* *** ******* **********. *** medical ********** ******* ** ** **** our ****** ********. ******* ****** **** only."
  • "****. ****** ****** *****, ******** **** less ******* **** ***** ******."
  • "*%. ** *** ********* * ******* government **********. ****** ** **** ****** with **** ********* ***** ******* ***********, we **** ** *** *** ********, and ***** *******, ** *** **** assurance (*** ** *** ******) ****** we *** ****** ****** ****** ***********."
  • "**%. ** ***** ** ****** ** 100% *** *** ********** *********, *** we ** ****** *******."
  • "**** *** ***. *** ****** ** obvious, ***** ** ***** ********"
  • "****. **'** *** **** ********* ******** interest ** **** **** ********* *** in *** *** *** ******* ***** delays *** ********* ***** **** *** a ******** **** ** ***** ** stolen ** **** ******. "
  • "*%. ** ***'* **** **** **** of ******* *** *** ** *** exploring **. **** ** ** **** it ** ******."
  • "***, ******* ********* ***** ******** *******"
  • "****. ********* *** *** ********* **** personal ******* *** ******."

**** ** ***** ******** ***** **** mobile ****** ** *** ********* ** market-specific ******** **************, ******* ******* **** phone-based *********** *** *** ****** * good *** *** **********, ****-********, *** institutional *********.

Too *********

* *********** ******* ** ***** ****** use ** ****** ****, **** ** terms ** ****** ********** *** ************** cost ******** ** *********** ******** ***** and ****.

  • "*% **** ******** ********** ************* *** license *********, *** *** *** ********* use ***********."
  • "**% ***** *** *** **** ** a *** ******."
  • "****. *** ******* *** ********** ************ used ** ** *********** ** *** customers. **** **** ******** ** ******** too **** ****** *********** ** *** time. *** **** **** **** ******. "
  • "** *** **** *** *********** **** not ************ ***** ****** ****** ** the *** **** **** ***** ********* lost ** ******** ***** ******."
  • "**** **** *% - *** ****** is *** ********** ** ******** ****** credentials *** ***** ****** **** ******** to ******** ***********(*****, ****, ***)"
  • "**** ** * ******* ** *** system ** ******* ********* * ****** readers. *** *** ***** ********* **** this ******* *** ** *** *** to ******** *** ******* ** * large ***** ******* *** ******** ** facility ******** ****** ****. *** ********* cost ** * ****** ********** ** difficult ** **** ** *********."
  • "* ***** **** ** ** ***** be *** **** ** *** *** time ********** **** ** **** ** the *****."
  • "*% **** **** **** & *** credentials *** *********."
  • "** **** **** *%. ********* ***'* want ** *** *** *** ********, and **** ***'* **** ** ********** the *******. *************, ** **** *** made *** ********** ** ****** ** for **** *** **** *** *** because ** ***'* **** *** *********."
  • "*. **'* * ***** **** *** very *********. * *** **** ** to * ****** *** **** *** door ** ***** * ****** **** a ****. * ****** ********** ** a ****. * ** **** ** phone ***, ****** **, **** *** app, *** **** *** ***, **** the ***** ****, **** **** ** bluetooth ** ** (******* **'* *** to **** *******, **** **** *** door."
  • "*% *** **** ****** ****** *********** because ** *** ********** ***** *** the ******* *** ****."

** *******, *** **** ** ******-***** readers *** ******* ** *********** ***** of '***-******' *****, *** ** ****** normal ****** ********* *** ********* ** result ** **** '****** *****' ******* in ****** *****.

*******, **** *** ********** ********** **** HID, ******* *** ****** *** * problem. *** ******** ******** ****** ********** pricing ** ** * ****, '*** user' ******* **** **** *** ****** of*****(*** **** ****:*** ****** ******), ******* **** ****** ****** ******* have ***** ** **** ****** *********** using *** **** ***** ** ******** cards, ** * '*** *****', *** device *****.

Systems *** ***** ****** *****, *** ******

*************, **** ***** **** **** ***** mobile ****** ******** ** ***, **** already **** ******** *** ********** ** the ******* **** ****.

*** ****** ********* ** '****** ****** is ***** **** ***** ***' ** internal ******** ** ****** *** *** diminished ** ******.

  • "****** *** *** ******* ******** ******-***** readers. **** ***** *% ** *** customers *** ******** ***** *** ****** credentials *** **** **** ** ** ready *** **** **** ****** ** roll ** ***."
  • "** *** ******** ** ** *** systems ********* **** *** **********, *********** 95% ** ****. ** *** ******** is *** **** *** ******** *****, 10%. ***** * *** ******* ***** in *** ***** *****, ** ****** gets *********** *** ** *** ********* hesitation ** ** ******* **** *** extra ************* *** ****** ** ****** credentials. ******** *********** *********** *****/****."
  • "*** ** *** ******* *** **** the ********** ******* ** *** *** user ******** *** **** *****. *** of *** ********* *** ********** ** using ***** ****** ** ***********. **** don't **** ** *** ***** ******** phones *** ****."
  • "***% *********, ***** **% ********"
  • "** ** *** * ********* ********* service **** *** ****** ******* ****. It ***** **** *** *** ******* software *****. *** ****** ** ** have ********* ********** ** ********* **."
  • "**** **** *%, ****** ** **** starting, * **** ********* **** **** purchased ****** ***** *******, *** *** still ***** *****"
  • "** *** ** ****** ****** *** that ******* ** *****-** ** *** RC-04 ** ** ** ********* ** about *** ******* ** *** ************* and ** **** **** ** ********* in ***** ** ******* ** *** applications. ** **** ** * ***** selling *******."
  • "*** ** *** *** ******* ******** mobile *************** *** *** ***** ******* very *** ********* ******** *** **** as *** ******* ** ******** ***** force **** ** *** ******** *********** while ********* ******** *****."
  • "***% *** ** *** ******* **** we ******* *** ****** ***** *** customers *****, *** **** ***** **% of **** ******** *** *** *******."

Strong ******* *******

******* ****** *** ** ****** ******* for ***, * ******* ****** ** high-percentage ***** ************ ********* *** ******* appeal ** *** *******.

******, ***** *********** **** **** ****** offers * *** ********* ************** ********** to ******* ** *** ********* *** differentiated, ****-********* ****** ******:

  • "*** *** **** **** ** ** a *********** *** *** ******** ** unlock ********. **’* * **** ******* point ** **** **** *********."
  • "***%. ** ** **** ** **** with ********** ******."
  • "****** ***** ****** ***** ***** *** its ********* ********* **** *** ** the *********** *** *******."
  • "**% ** *** *** ************* ******* Kantech ********* **. ***** ** **** for ***** ** ****** *** **** doors **** * ********."
  • "** *** ******* *** *********** **** this ********** ** **** *** ********* of *** *******"
  • "**-**%. ********* ****** **** *** ***** convenience ** ********* ***** ******** **** their *****."
  • "**% ******** ******** *** ****** ******. As * ******* ** *** ******** (Genetec ******** ******) ********* **** **** a ****** ******* ** *** ***** they **** ** ******** ******* * door"
  • "**% ******* ( ** **** * lot ** ***** *** ** ** a *** ******* ***** **** ********* don't **** ** ***** **** ******) also ********** ********* **** *** ******* of ***** **** ** **** ********** from * ******** *** *********** ** whatever."
  • "**%, ******* **'* * ***** ******* and ********* *** * *****."
  • "****** ****** ****** ********. ***** ******* bring ***** ****** ******** **** **."

Upcoming ****** ********

**** *** ********* ******* ********** ***** and **** ******* / ***** **** out ******* **** ***** ** ****** weeks.

***** *** *** ********** **** *******:

Comments (4)
Avatar
Scott Fischer
Jul 19, 2019
Lorica Consulting LLC • IPVMU Certified

** ** ***-****, *** ** *** new ************* ******* ****** ******* *******.  We **** ********* **** ******* ******* with * ****** ******** ********** **** positive *******; *******, ** ***** ******* employees ** **** *** ******* * ********* badge ***** ******* *** ******** ** using * ****** **********.  ** ** allow ********* ** **** ******* * corporate *****, ** ***** ********** ****** our *******-**-***** ******** ***** ***** ***** ** ** visible ********** ******* ********** *** ************ personnel ****** *** **********.  ** ******* piggybacks **** ** ****** ***** ********* use **** ****** ***********, ***** ** no *** ** ****** ******** *** unauthorized ********** (****** ***** ** * small, ****-**** ******** **********).

** *** ******** ******* *** * solution ** **** *****.  ** **** * way ** ******** ****** ******** ********** and ****** ***** **** *** ****** ****** areas.  ******* **** **********, * ** not *** **** ******** ** ****** credentials ****** ** ***** **** ********* *** security ************.

(1)
(3)
UE
Undisclosed End User #1
Jul 19, 2019

***** *** ****** **. *** **** companies *** ********* ** ********* **** in **** ** * ******** ***** due ** **** ******* ************/******** **** stipulate **** ******** ******* ******* ***** ID. ***** ******** ***** ***** ** contractors *** ******* ** **** *** must **** * ********* ***** ** some **** ***** ******. 

* ******* ****** ** *** *** users ***** ** ********* *** ******* benefits ** **** ***** **** ** a ******* **** ** ***** ***** policies *** ********** ** **** **** fit **** ** ** * ******* capacity. 

(1)
CH
Chris Hammond
Jul 22, 2019

* ****** *** **** *********** **** said ******** ***** **** * ****** for *** ***** ****** *********** *** using/selling *** *** ********* *****. 

(2)
U
Undisclosed #2
Jul 22, 2019

**** *** ****** ******* ***** ******** have ** *********. **** * ****** few *** '****' ** ***, *** anyone *** '******' * *****, *** it's **** ****** ** ** ***********.  The ********* ***** * ****** *** brings ** **** ***** *** *** more *********** ***** ** ***** *****. This ***** *****://***.**********.***/**************/****-********-******-****/**-*************************** ***** **** ***** ****** ***** ****** 150 ***** * *** ** *******,  ******* they ****** **** ***** ***** ***** is. *** *** **** ********** ** the ***** *****'* ** * **** thing ** **** **** ****.

***, ******* ** * ****** ********** as **** * **** *********** ** short *******. * ***** ** * computer **** *****

- ***** ** **,  ** ***** be **** ** ****** ******* ** real ****, ** ******** ****** ***** on ********* ** *** ******** ***** accessed ** ********** **** **** *** holder ***** ** ******.

- *** ******* ********** - ******* two ** **** ****** ************** **** authentication ***** ********** ** *** ********** and ********* ********** **  * ******/****/**** basis, eliminating *** **** ********* **** ** the ****.

-*********** - ******* **** ************* (**** or ******** *************), *********** **** ****** (silent **** *** ****).

- ****** ***** *** ********

*** ** **** **** ** ***'* stop ******** ** * ***** ** a *********** *** * ********** *** start ********* **** ** *** ** with ** ** **** ******** *******.

(2)
(2)