Mobile devices can today be used to open doors and enter secure areas as well as access computers, corporate networks and associated information assets. BYOD only complicates the situation.
Customer organisations may be under attack on two fronts: a continued lack of money to spend on security measures; and issues surrounding the complexity of credential management.
Yet in terms of access control, there is a sizeable lack of knowledge about how to make the most of existing access infrastructures as well as stay ahead of technological developments.
Security requires constant attention and investment in any business. Furthermore, the intricacies of credential management demand better knowledge and skills than ever.
Mobile access is challenging the industry to reassess its perception of security frameworks. Organisations want to understand how the convergence of physical and IT security will affect their overall access management strategy.
Smartphones can be sent digital cards and keys via internet portals or over the air from a service provider, which can be presented to readers, enabling access. One-time tokens can be used to log in.
There are strong authentication and card management capabilities for computer and network login, enabling identity management on plastic cards, smartphones or printers.
Resellers ought to consider that long-term buying decisions should anticipate a need for mobile access technology. The security landscape is constantly changing, so making the right security decisions is more important than ever for customer businesses.
Security systems when built should be capable of incorporating new technologies, applications and functionality, layering physical security as well as credential authentication and system support. One size does not fit all, so partners can step in here.
Resellers should also keep tabs on policies and structures that can lower TCO for their customers. Offerings that make an existing budget go further will continue to be favoured in this challenging economic climate.
Channel partners remain responsible for bridging the gap between manufacturers and end-user customers. Showing businesses how to harness mobile access in an adaptive and scalable security infrastructure is vital.
Tony Ball is a senior vice president of sales at HID Global
Vendor's announcements include AI-powered Microsoft Office, a move away from password verification and an alliance with Adobe and SAP
Vendor claims hackers are hijacking machines to mine for cryptocurrency
Nearly half of SMBs are planning to invest in digital workflows to reduce their paper-based processes by 2025, according to Quocirca
The charter has pulled together the biggest names in tech in an unprecedented attempt to address the tech industry's lack of diversity. Tom Wright asks how it plans to do it