Going mobile with access control

Oct 26, 2015

Blog Post2

You can’t go anywhere these days without seeing a mobile device in someone’s hand. According to Gartner, smartphone sales reached $1.3 billion in 2014. On the tablet side, Gartner also predicts that 321 million tablets will ship by the end of 2015. In a 2012 study, Forrester Research indicated that nearly 60 percent of all corporate employees shared, accessed and managed content outside of the office through mobile devices.

We’ve also seen security operators switching from using two-way radios to using their mobile devices to monitor property and respond to critical events.

These trends tell us how much time we spend on mobile devices and how mobile technology is shaping the way we manage and use various systems we connect to on a daily basis.

For example, we now have the ability to quickly assess, view and respond to and manage events being monitored by access control systems from a single smart device. This enhancement provides a new realm of management capabilities at our disposal.

If you are considering integrating mobile devices into your access control system, here are four points to consider.

1.       Browser-based access control

Many access control systems offer application-based mobile integration, meaning you use apps loaded on a mobile device to interact with the system. However, sometimes these apps are designed with limited features and capabilities.

Avigilon’s Access Control Manager (ACM) offers users a 100 percent browser-based access control system with full manageability, no matter what type of mobile device you use, allowing security personnel to respond to critical events.

Not only is a browser-based access control system more flexible (you can use a smartphone, tablet or laptop computer), but it streamlines operations by allowing multiple operators to connect to it simultaneously. In addition, any changes to the system are instantaneous and shared across all operators.

When it comes to mobile devices and access control, system operators should be able to use the device of their choice – your access control system should not limit operators to a particular device. ACM is browser-based, which means you can access it from anywhere, including from mobile devices.

2.       Management and distribution of credentials

Access control credentials have changed over the years. In the past, physical objects such as keys, magnetic strip cards, radio frequency identification (RFID) cards or proximity cards were commonly used to enable access to a building. Today, credential technology has evolved to mobile devices using near field communication (NFC) and Bluetooth technologies.

Using mobile devices as access credentials is gaining popularity because physical objects are more easily lost, forgotten, borrowed or misplaced, creating potential security risks.

What will we see in the future? People will be able to use one phone with a mobile credential to connect to a virtual private network (VPN), a wireless network, a corporate intranet, a cloud/Web-based application, single-sign-on clients and other IT resources. While there is a movement to have access control credentials added to mobile devices, physical and mobile credentials will continue to co-exist for quite some time.

One of the key issues is how to secure the credential on the mobile device.

NFC is not available on all smartphones and uses a tap-and-go method of operation, which requires physical contact of the phone to an access control reader. Also, some mobile providers have made it difficult to successfully deploy NFC technology across a single operating system.

Bluetooth technology, on the other hand, is available on both Android and Apple devices and does not require physical contact with the reader to operate. For example, you can use Bluetooth to open electronic doors and gates using a “twist-and-go gesture” – rotating the device as you approach – up to 30 feet away from the reader.

In addition, Bluetooth technology used in combination with ACM’s mustering feature delivers an emergency personnel assembly tracker and locator, which can help ensure your staff are not left in dangerous areas.

3.       Multiple layers of authentication

When deciding whether to use mobile devices as an access control credential, it is important to consider adding multiple layers of authentication, such as keypad commands, to areas that require a higher level of security. Mobile access may not be appropriate for all areas of your organization, but it can be a powerful tool when you pair it with additional layers of authentication.

Use of existing infrastructure

Finally, it is important to consider the existing infrastructure when deciding if mobile access is right for you and your business. If you are installing a new system, mobile device readers can be cost-effective when you integrate them with Bluetooth technology. In most cases, new installations will incorporate a number of different technologies, so you can opt to use physical credentials as well as mobile credentials.

If you are installing a system in an existing infrastructure, you should consider the costs related to replacing physical credentials and adding mobile-enabled card readers. If you intend to use both physical cards and mobile devices to control access, you would need to replace existing card readers.

Stay Connected. Sign up and receive exclusive industry articles and other value-added content from Avigilon. Follow us on Twitter: @Avigilon

We welcome the re-use, republication and distribution of Connected content. Please credit us with the following information: Used with the permission of avigilon.com/connected.   

Category: IT


For Media Relations

Please email media@avigilon.com or call 604-629-5182


ACC Version Last version of ACC tested with camera. This also implies support for later versions of ACC unless specifically listed otherwise.
Audio Input Receive audio feed from camera.
Audio Output Send audio to speaker attached to camera.
Autodiscovery Automatic discovery of camera IP address when connected within a LAN environment.
Compression Type Describes the encoding types supported for the camera.
Connection Type Describes the type of Device Driver used. Native refers to the Manufacturer's specific device driver.
Dewarping In-Client dewarping of fisheye or panoramic cameras.
Digital Input Receive Digital or Relay inputs from camera.
Digital output Trigger digital or relay outputs physically connected to a camera.
Motion Quick display of whether Motion Recording is available on for the camera.
Motion Configuration Configuration of motion detection within the ACC Client.
Motion Recording Support for motion-based recording.
PTZ Quick display of whether PTZ functionality is available for camera.
PTZ Control Basic PTZ Movement.
PTZ Patterns/Tours Ability to create and trigger either PTZ Patterns, or PTZ Tours, depending on camera support.
PTZ Presets Create and trigger PTZ Preset positions.
Unit Type Type of camera.
Verified By Organization which tested camera and reported capabilities.
Verified Firmware Specific firmware version tested.
Manufacturer Blah
Model DS-2DE2103
Connection Type ONVIF
Unit Type IP PTZ camera
Compression Types H.264

  • ACC Version
  • Model DS-2DE2103
  • Connection Type ONVIF
  • Manufacturer Blah
  • Manufacturer Blah
  • Manufacturer Blah
  • Manufacturer Blah
  • Manufacturer Blah
  • Manufacturer Blah
  • Manufacturer Blah
  • Manufacturer Blah
  • Manufacturer Blah

Verified by:

Download Test Report