20% firms to use smartphones as access cards by 2020: Gartner

Image
Press Trust of India New Delhi
Last Updated : Jan 17 2017 | 5:28 PM IST
By the year 2020, about 20 per cent organisations globally are expected to use smartphones instead of traditional physical access cards to enable access to offices and other premises, research firm Gartner today said.
In 2016, less than 5 per cent of organisations used smartphones to enable access to offices and other premises, Gartner said in a report.
Gartner projected that the same kind of cost and user experience (UX) benefits will drive increasing use of smartphones in place of discrete physical access cards.
"A significant fraction of organisations use legacy physical access technologies that are proprietary, closed systems and have limited ability to integrate with IT infrastructure," Gartner Research Director David Anthony Mahdi said.
Today, the increasing availability of mobile and cloud technologies from many physical access control system (PACS) vendors will have major impacts on how these systems can be implemented and managed, he added.
PACS technology is widely deployed across multiple vertical industries and geographies to secure access to a wide range of facilities (buildings, individual offices, data centers, plant rooms, warehouses and so on), ensuring that only entitled people (employees, contractors, visitors, maintenance staff) get access to specific locations.
Mobile technology is already widely used for logical access control. Phone-as-a-token authentication methods continue to be the preferred choice in the majority of new and refreshed token deployments as an alternative to traditional one-time password (OTP) hardware tokens.
Smartphones using technologies and protocols such as Bluetooth, Bluetooth LE, and Near Field Communication can work with a number of readers and PACS technology.
Using smartphones can also simplify the integration of biometric technologies.
"Rather than having to add biometric capture devices in or alongside readers, the phone itself can easily be used as a capture device for face or voice (or both), with comparison and matching done locally on the phone or centrally," Mahdi said.
This approach also mitigates the risks from an attacker who gains possession of a person's phone, he added.
"We recommend that security and risk managers work closely with physical security teams to carefully evaluate the UX and total cost of ownership benefits of using access credentials on smartphones to replace existing physical cards," he said.

Disclaimer: No Business Standard Journalist was involved in creation of this content

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

First Published: Jan 17 2017 | 5:28 PM IST

Next Story