Page 50 - Institute Quaterly 5 Final
P. 50
Our Corporate Partners
Five reasons to integrate
mobile technology into your
security solution
By Steve Natton, Gallagher
Mobile technology use in everyday life has increased massively people tend to care more about their phone than they do an
in recent years. Most of us now have a mobile device that we access card, making them less inclined to lend their phone to
use to manage different aspects of our lives – from banking, to others and are more likely to notice if their phone has been lost
accessing public transport, and even paying for a coffee. With or stolen. If someone were to lose their access card on a Friday
approximately half of all web traffic around the globe coming afternoon, for example, they may not notice it was missing until
from mobile device users, the move to mobile is having a major the following Monday, but a missing phone would be noticed
impact on industries worldwide. much sooner.
So why then is mobile not utilised more Mobile credentials are not susceptible to card cloning and
within the security industry? some mobile solutions hold the option of adding two -factor
In this white paper, we highlight five reasons to integrate authentication using the built-in device security, such as
mobile technology into your security solution. Here, we take fingerprint, PIN, or facial ID on some phones. This is considered
an in-depth look at some of the frequently referenced barriers industry best practice and adds an extra layer of security,
to adopting mobile technology, discuss the benefits mobile particularly if using biometrics, to ensure the credential cannot
technology can bring to an organisation, share the views of be used by anyone other than the authorised credential holder.
industry leaders, and look to what the future holds for mobile
within the security industry. Reviewing the authentication method of a mobile credential
solution can provide some assurance as to the safety of the
Barriers to mobile application. FIDO authentication, for example, is trusted by
There are a number of reasons organisations may be hesitant many leading technology organisations around the world.
to adopt mobile security solutions; whether it’s concerns over It uses public key cryptography with the private key stored
the safety of the technology, uncertainty of how the technology securely on the phone to create strong authentication that is
works, or hesitations from staff about using personal devices resistant to phishing and other common attacks.
for workplace access control. Here, we address some of the
most common concerns our customers raise with us in regard With the current push to contactless methods for carrying
to mobile security technology out day-to-day activities, mobile credentials can help protect
people’s health and safety by reducing contact between people
How secure is mobile? and surfaces. With a longer read range between the device
Just like a high security access card, mobile credentials are and reader than an access card, people are unlikely to make
secure and safe. The nature of a mobile device automatically direct contact with the reader, and, as mobile credentials can
keeps the credential more secure than an access card, as be set up remotely, face-to-face interactions are reduced, and