Security Business

FEB 2019

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link: https://sdi.epubxp.com/i/1082145

Contents of this Issue

Navigation

Page 33 of 59

34 Security Business / www.SecurityInfoWatch.com / February 2019 Technology Focus If an app is seldom-used and lacking in mindshare, then users will never get the benefit of all the data collected and stored on their behalf. Mobile credentials feed into this scenario, because a tenant population equipped with apps can generate far more information about building usage than a population without them. Apps encourage engagement with other building systems and amenities, which drives further learning about user behavior and building usage patterns. Armed with this information, analytics can improve not only the security experience, but the building experience as a whole. The Future and Standardization of Mobile Credentials The future of mobile credentials could take a number of different directions, depending on how the questions of standards and/or market dominance are determined. Since market dominance usually decides which standard comes out on top, in some sense, standards and marketing dominance are ultimately the same thing. At this writing, nearly every connected device and access control manufacturer has its own proprietary protocol between the mobile apps and the physical mechanisms they can unlock. Yes, they use some common building blocks such as Bluetooth, NFC and widely available encryption protocols; however, they are not interoperable. One approach to providing a good user experience amid this plethora of proprietary credentials is to develop a container app that hides these details from the user. This is the approach taken by portfolio solutions like the Apple Wallet, which conveniently holds all the credentials in one place, but still leaves credential selection and management to the user. A more domain-specific approach is that of Stratis, a leader in the smart apartment/smart building category. Its app for apartment dwellers transparently manages multiple credentials that function across common-area access control systems, individual apartment doors locks and multiple IoT devices within the dwelling. Users perceive a single, unified permission experience that hides all the messy details of our non-standardized industry landscape. This last step in making mobile credentials usable for the average person is critical to delivering a truly “consumerized” experience, and in turn, driving the analytic benefits of widespread mobile interaction with physical security systems. Expect a lot of change, which is to say – expect a lot of excitement. ■ » Steve Van Till is President and CEO of Brivo, and the author of the 2018 ASIS Security Book of the year, The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age, available on Amazon.com. Request more info about Brivo at www.securityinfowatch.com/10213096.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Business - FEB 2019