The future is now. This statement seems to be confirmed every day, every time to get out we do not need to carry: credit cards, watches, mailbox, identifications, door keys, contact book or music players. Well all this fits in the cell phone. Everything we need is available in a small device that fits in your pocket.

By Patricio Delorme *

The cell phone is not only used to make calls or send and receive messages, since nowadays, access personal and corporate information, work remotely, make purchases from anywhere and at any time, open physical doors, control a printer Or releasing electronic locks is possible through the use of the mobile phone and could also be much safer.

- Advertising -

Although it sounds futuristic, thanks to variables such as comfort, convenience and, above all, security, these types of solutions are not alien to the new generations, on the contrary, Latin America has been adopting with speed, acceptance and high degree of satisfaction These solutions in various market segments, both public and private.

Such is the case of Mobile Access® mobile access control technology developed by HID Global, which offers various solutions for secure access control using a mobile device. In other words, it converts a smartphone, tablet and mobile device into a secure identification credential, with encrypted and digitally signed technology, with which it is possible to open doors, free vehicular access, validate and identify, among many other actions in a convenient way , Comfortable and secure, introducing a safe and simple process of identity management.

In addition, the Mobile Access® solution offers different modes of use with different levels of security and in the event of theft or loss of the mobile device, frequent situations in the global context, it allows to remotely remove the access credential stored in The device and restrict access with it.

Rapid adoption in Latin America

There are two segments that have demonstrated a faster adoption of technologies associated with mobility. The first one is made up of people from hierarchical positions (Managers-Directors-CEO's), for whom mobile devices are the fundamental tool of their work. For example, these professionals use their cell phones to perform most of their personal and business activities, so it is much more convenient for them to carry their access credentials and not have to rely on carrying an additional item, such as a credential PVC.

The second segment in which there was a greater acceptance of this technology and which, somehow, claims to continue adopting it, is the young population: students, university students and young entrepreneurs, especially the technological scene, are groups of people informed And aware of the need to have technologies that offer mobility, comfort, without compromising maximum security, that makes life easier and streamline processes, such as Mobile Acces®.

The future in a single device
As the future glimpses, from this present to which we attend, it seems clear that everything evolves towards the cell phone. There converge the majority of the personal and business activities. That is why it is important to combine mobility with powerful security systems.

Although in the present, the combination of two or more security methods is only incipient, in the short or medium term, secure access to information or a site will combine processes that require more than one validation, such as: "what I have "(the mobile device) with" what I am "(Facial Biometry, Finger,, iris, veins,) and what I know (type information of passwords or keys). Undoubtedly, this will be the safe way through which you can access certain physical and virtual places that require a unique identification.


* Patricio Delorme holds a degree in Security Sciences, graduated from the University Institute of the Argentine Federal Police in Buenos Aires. He also has a Postgraduate degree from the Argentine Catholic University of Buenos Aires, Argentina. He has more than 20 years of experience in the security industry and currently serves as Director of the Access Control Business Unit for HID Global in South America.

Santiago Jaramillo
Author: Santiago Jaramillo
Editor
Social communicator and journalist with more than 15 years of experience in specialized digital and print media for Latin America. Currently Editor of the Security Sales, Building Management and Academic Coordinator of the TecnoEdificios Congress.

IN OTHER NEWS

article thumbnailSony The HAW-S series is the first NVR compatible Sony 4K device that can record and play in 4K resolution, for monitoring systems of ...
article thumbnailSeco-Larm The new multifunctional timer and counter SA-025MQ includes operation with low current consumption, seven modes easily ...
article thumbnailJohnson Controls The new 8.0 version of Kantech's EntraPass now adds support for the American Dynamics NVR network recorders through the app ...
article thumbnailST Electronics The AgilFence perimeter intrusion detection system developed for perimeter fences offers reliable detection and ...
article thumbnailAxis Communications The new AXIS Companion Dome Mini LE camera is designed to meet the needs of video surveillance in small businesses ....
article thumbnailU.S. For the first time in its history, the WINGS Summit will have online registration open to the public to visit the commercial exhibition and ...
article thumbnailInternational. Information technology (IT) managers are more likely to catch cybercriminals on servers and networks ...
article thumbnailU.S. Recent reports from Business Insider, CNN Business and many other publications have highlighted the undisclosed on-board microphone ...
article thumbnailInternational. ASIS International launched the Selection and Training Guide for Private Security Officers (PSO) of ASIS (ASIS PSO-2019) that ...
article thumbnailInternational. The World Wide Web Consortium (W3C) has just approved the web authentication API, also known as the WebAuthn standard, which is ...