Re-posted with permission from Elatec and edited.
User authentication and access control are moving beyond physical ID cards to incorporate emerging mobile technologies. At the same time, cloud services allow access system managers to monitor, configure and update RFID readers remotely, saving management time and costs. These technologies are bringing access control into the digital age and enabling new business models. New solutions from partners like Elatec are built to support emerging digital models for access control and enable companies to “future proof” their access systems.
Rise of Mobile Authentication Technologies
Mobile credentialing systems are on the rise for both consumer and business applications. It’s no wonder: mobile credentials offer significant advantages for both users and access system managers.
- Convenience: Mobile credentials are convenient for users, as they eliminate the need to carry a separate RFID card or fob for physical access applications or enter passwords for digital access. Instead, users can simply use the smartphone they already carry.
- Security: Mobile authentication can leverage advanced security features built into mobile devices, such as secure storage and biometric scanners, to provide a more secure authentication method. Mobile devices facilitate the implementation of multi-factor authentication by allowing the use of a combination of credentials, including biometrics, for verifying identity.
- Simplicity: Mobile credentialing systems can reduce the need for physical security tokens or keycards, lowering costs for organizations and simplifying the management of access control systems.
- Versatility: Mobile authentication can be used for both physical access control and digital access to devices, networks and data, creating a seamless user experience in a unified access system.
Mobile credentials are stored directly on the smartphone and transmitted to an RFID reader via Near-Field Communication (NFC) or Bluetooth® Low Energy (BLE). Various mobile transponder technologies and platforms have emerged for both Apple (iOS) and Android devices in recent years, and the field is continually evolving.
Newer credentialing platforms, such as Wavelynx Mobile (MyPass Mobile Credentials) for iOS and MIFARE 2GO for Android, offer significant advantages in terms of security, flexibility and management simplicity. Both of these protocols allow for cloud-based provisioning and management of mobile keys, which lowers operational costs and enables instant issuance or revocation of mobile credentials. They also conform to advanced encryption standards for higher security and compliance. These and other emerging mobile credentialing protocols make it easy for companies to transition to a modern mobile access solution while maintaining compliance with high security standards.
Remote Reader Management
Along with mobile credentialing systems, cloud-based management of user credentials and RFID readers is transforming the industry. Remote configuration of RFID readers via the cloud saves costs, enables easier management of the access system, and enhances security. Here’s why more businesses are implementing cloud-based management for access systems.
- Operational Efficiency: Administrators can adjust settings, update firmware, and change access parameters for RFID readers from a centralized platform without needing to visit each device physically. Remote configuration capabilities eliminate the need for technical staff to travel to each site for installation, updates or troubleshooting, leading to significant savings in time and costs.
- Security: Security vulnerabilities can be promptly addressed by remotely deploying patches and firmware updates, reducing the window of opportunity for attackers to exploit outdated systems. Access permissions can also be dynamically updated in response to evolving security needs.
- Scalability: As the organization grows, new RFID readers can be added to the system and configured remotely to meet the expanding needs.
- Monitoring: The system can monitor the health and status of RFID readers, allowing for proactive maintenance and reducing the risk of unexpected failures.
Flexibility: New RFID or mobile transponder technologies can be easily added to installed readers, creating a flexible and future-proof access solution.
Digital Age Access Solutions from the ISG
As new mobile access protocols emerge and digital business models evolve, the ISG, with partners like ELATEC, will continue to offer RFID reader software to meet the needs of our customers across the US and Canada.
The latest version of ELATEC’s advanced RFID reader software was designed to support new digital business models and enable companies to take full advantage of mobile credentialing and cloud-based management of installed readers. It also incorporates new diagnostic capabilities and advanced security features.
Talk to your local ISG expert to explore considerations in moving your outdated access control solutions to the digital age of remote, mobile and touchless access management. You can also discuss your mobile credential, time and attendance, tracking and remote access needs with us, so we can help you discover the most cost-efficient solutions your organization.

