Page 50 - Institute Quaterly 5 Final
P. 50

Our  Corporate Partners


















           Five reasons to integrate



           mobile technology into your



           security solution




           By Steve Natton, Gallagher



           Mobile technology use in everyday life has increased massively   people tend to care more about their phone than they do an
           in recent years. Most of us now have a mobile device that we   access card, making them less inclined to lend their phone to
           use to manage different aspects of our lives – from banking, to   others and are more likely to notice if their phone has been lost
           accessing public transport, and even paying for a coffee. With   or stolen. If someone were to lose their access card on a Friday
           approximately half of all web traffic around the globe coming   afternoon, for example, they may not notice it was missing until
           from mobile device users, the move to mobile is having a major  the following Monday, but a missing phone would be noticed
           impact on industries worldwide.                    much sooner.


           So why then is mobile not utilised more            Mobile credentials are not susceptible to card cloning and
           within the security industry?                      some mobile solutions hold the option of adding two -factor
           In this white paper, we highlight five reasons to integrate   authentication using the built-in device security, such as
           mobile technology into your security solution. Here, we take   fingerprint, PIN, or facial ID on some phones. This is considered
           an in-depth look at some of the frequently referenced barriers   industry best practice and adds an extra layer of security,
           to adopting mobile technology, discuss the benefits mobile   particularly if using biometrics, to ensure the credential cannot
           technology can bring to an organisation, share the views of   be used by anyone other than the authorised credential holder.
           industry leaders, and look to what the future holds for mobile
           within the security industry.                      Reviewing the authentication method of a mobile credential
                                                              solution can provide some assurance as to the safety of the
           Barriers to mobile                                 application. FIDO authentication, for example, is trusted by
           There are a number of reasons organisations may be hesitant   many leading technology organisations around the world.
           to adopt mobile security solutions; whether it’s concerns over   It uses public key cryptography with the private key stored
           the safety of the technology, uncertainty of how the technology   securely on the phone to create strong authentication that is
           works, or hesitations from staff about using personal devices   resistant to phishing and other common attacks.
           for workplace access control. Here, we address some of the
           most common concerns our customers raise with us in regard   With the current push to contactless methods for carrying
           to mobile security technology                      out day-to-day activities, mobile credentials can help protect
                                                              people’s health and safety by reducing contact between people
           How secure is mobile?                              and surfaces. With a longer read range between the device
           Just like a high security access card, mobile credentials are   and reader than an access card, people are unlikely to make
           secure and safe. The nature of a mobile device automatically   direct contact with the reader, and, as mobile credentials can
           keeps the credential more secure than an access card, as   be set up remotely, face-to-face interactions are reduced, and
   45   46   47   48   49   50   51   52   53   54   55