Security Business

FEB 2019

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link: https://sdi.epubxp.com/i/1082145

Contents of this Issue

Navigation

Page 32 of 59

February 2019 / www.SecurityInfoWatch.com / Security Business 33 mobile apps daily and view them as an integral part of their lives. This is where mobile credential usage has a distinct advantage over other kinds of apps because in a mobile-first access control system, people must use mobile credential apps in order to access their place of business, conference rooms, restrooms, and perhaps even the company gym. They become habitual (or “sticky”) users, which presents the opportunity for adding additional security functionality and having employees, tenants or residents become partners in ensuring the security of the whole. The Smart Business If the smart home is on the rise, the smart business cannot be far behind – and mobile credentials are the benign Trojan horse that will put enough apps into enough hands to bring about this new and better world of wider involvement in the security enterprise. Smart buildings have created and inroad for smart businesses; however, system administrators and building engineers are so far the principal beneficiaries of those systems – mostly because they are the only people who get to use the apps. The rest of us might benefit from better temperature control and avoid rent hikes thanks to better energy management, but we are not truly engaged with the system. Because mobile credentials are in the hands of the people who actually use the facilities, mobile credential apps engage users in far deeper ways. Shared workspace and modern property management platforms are at the vanguard of creating these benefits for their user populations. Property management giant Greystar, for example, is deploying advanced systems that integrate mobile credentials for both common area and tenant doors with intercoms, smart apartment controls and more of the building’s amenities. As compelling as all these features are in the aggregate, it is the daily use of credentials that keeps the app in front of users. Daily use opens up opportunities for the “smart business” that would not be possible in a world where building occupants rarely bother to use the app. The Rise of Mobile Analytics Better mobile analytics are another effect of the smart business evolution. Nearly every major Business Intelligence (BI) application has a mobile component that makes it easy for developers to put clear intelligence in the hands of their users. Usually these analytics are presented as a highly digested version of the underlying data – typically featuring graphs of trends and statistics, with user-definable push notifications for more urgent alerts. These mobile analytics put security professionals on the same playing field as other corporate departments, such as sales and finance, which have enjoyed the benefits of mobile decision support for many years. As an example, Splunk – a machine data analytics platform – has created a “splunkbase” app that ingests access control data, displays an intuitive analyzed version of it, and alerts users to suspicious activity. As with the success of sticky apps in other domains – and there are no better examples than in gaming and social media – frequency of use plays a key role in establishing the value of the underlying technology. If analytics can be delivered in real time to an app that is used dozens of times a day, the results have a much greater chance of affecting decision-making – which is the whole point of delivering information in the first place. CSOs have long known that an engaged tenant population is a more secure tenant population – the problem has always been how to bring it about. This is where mobile apps come into the picture. In a mobile-first access control system, people must use mobile credential apps in order to access a facility, creating "sticky" users. All Photos: Brivo

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Business - FEB 2019