Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten,...
Transcript of Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten,...
![Page 1: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/1.jpg)
Powering the trusted identities of the world’s people, places & things
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
Mobile Access is the Killer AppThe Path to Flexible, Secure CredentialsBrandon Arcement – Senior Director, Product MarketingApril 8, 2019
![Page 2: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/2.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Do You Remember the First Time You Saw This?
![Page 3: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/3.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
It's a New World
![Page 4: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/4.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Credential Requirements
Security
Applications
Mobility
Agenda
The Status Quo
Selecting the RightCredential Solution
Mobile Access
How to Upgrade
![Page 5: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/5.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
The Status Quo - Vulnerabilities
NACCU 2018 Campus Profile Summary Report
![Page 6: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/6.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
On “secure” smart cards:
Unencrypted Card Serial Number
Poor key management
Unencrypted data payload
Identifier marked on the credential
Open, untracked format
Reader configuration supporting legacy technology
Unencrypted communication from reader to panel
The Status Quo - Vulnerabilities
![Page 7: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/7.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
The Status Quo – Limited Multi-Application
CSN: 123456789
![Page 8: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/8.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
The Status Quo – No Path to Mobile
Most technologies deployed today do not
provide a path to mobile access
Reader infrastructure not capable of transition
Common cross-platform credential model not considered
![Page 9: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/9.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Reader Firmware
Disparate Cross-Platform Credential Models
Card
iOS App
Card
sM
obile D
evic
es
Android App
iOS eSE
Android eSE
Wearable 1
UID: 123456789
![Page 10: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/10.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Vulnerabilities in Technology or Implementation
Limited Multi-Application Support
No Path to Mobile Access
The Status Quo - Summary
![Page 11: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/11.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Selecting the Right Credential SolutionSecurityApplicationsMobility
![Page 12: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/12.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Keep Credential Number Private
The Key is Key
Secure Technology is Foundational
Strong defense has Layers
Track the Format
Remove the Weak Link
Lock the Back Door
Selecting the Right Solution – SecurityA Holistic, Secure Credential Program
![Page 13: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/13.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Selecting the Right Solution - Applications
Leverage technology that makes it possible to incorporate an increasing number of physical, logical, and extended applications:
– Building access
– Secure print authentication
– Time and attendance
– Cashless vending
![Page 14: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/14.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Selecting the Right Solution - Mobility
Evaluate solutions that offer the freedom to choose
Device form factors - Card, Phone, Tablet, Wearable…
Semiconductor platforms - NXP, Infineon, EM…
Operating systems - iOS, Android, Tizen…
Readers - Wall readers, Locks, USB readers, embedded
devices…
Communications protocols - NFC, Bluetooth…
…to address your future needs
![Page 15: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/15.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Mobile Credentials – The Next Frontier
https://www.youtube.com/watch?v=hhvNr3nJ2OA
![Page 16: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/16.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Common Cross-Platform Credential Model
Reader Firmware
Card
sM
obile D
evic
es
UID: ?????????
UID: ?????????
![Page 17: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/17.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Seos Credential Technology
![Page 18: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/18.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
HID Mobile AccessBringing the Magic Back to PACS
![Page 19: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/19.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
9 Years of Experience in a Dynamic Market
ASSA ABLOY starts world’s first SIM -based Hotel pilot
2009 2010 2011 2012 2013 2014
NFC phones start to appear
ASSA ABLOY develops SIM -based MIFARE solution
NFC microSDs and iPhone sleeves are pushed in the market as bridge technologies
ASSA ABLOY creates solution with MIFARE and bridge technologies
Starwood tries the microSD and iPhone Sleeve solution and dimisses them
Slow uptake on NFC phones.Mobile operators struggle to launch SIM solutions
Arizona State University pilots microSDs and iPhone Sleeves with HID. Lack of native phone support ends the pilot
BlackBerry starts working on an embedded SE solution with NFC
HID tests an iCLASS solution with embedded Secure Elements on BackBerry 9900. Lack of support on other devices and that mobile opetators blocked the solution made it unsellable
A platform independant technology is needed to be future proof. Seos is launched
Google wallet is launched on Google devices and embedded SE
Mifare4Mobile 1.0 is published.Only one card active simultaneously.Closed environment for managing credentials. Unusable specification
Investigates SIM based NFC solutions. Blocks Google Wallet and embedded SE solutions
HID runs a several SIM basedSeos pilots with different MNOs
Samsung announces an embedded SE NFC solution with Visa. Basically no services have been launched
ASSA ABLOY starts integrating with leading handset manufacturer embedded SE solution.
Android 4.3 is released. Includes native support for Bluetooth Smart.
ASSA ABLOY creates a Seos over Bluetooth Smart solution, providing native support for Android and iOS
Visa and Mastercard releasespecifications for payments with NFC Host Card Emulation (HCE)
ASSA ABLOY creates HCE proof-of- concept. We can now emulate Seos in software on Android NFC phones
Allegion tries iPhone MIFARE sleeve, 3 years after ASSA ABLOY
Apple Pay is launched. Based on NFC and eSE
HID Mobile Acces®
Mifare4Mobile 2.0 is published. Only pilots exist
Android 4.4 is released with NFC Host Card Emulation (HCE)
![Page 20: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/20.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Integrated Architecture
Your App
API
PACS / IAMS
Credential Admin
HID PlatformMobile ID
You Choose: HID User Interfaces Cloud API & App SDK
![Page 21: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/21.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Tap Twist & Go
HID Mobile AccessTwo Original Modes of Operation
Like withprox cards
TWISTTAP
![Page 22: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/22.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Android Wear & Apple Watch
![Page 23: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/23.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Widget & 3-D Touch
Sw
ipe R
igh
t
Press F
irm
ly
![Page 24: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/24.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Supported Devices List
250+Devices
![Page 25: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/25.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Bluetooth
NFC vs. Bluetooth
NFC Card Emulation
Supported by iCLASS SE readers
Short Range
– Tap only
Performance similar to card
Android only
Supported by iCLASS SE readers
Short & Long Range
– Tap, Twist & Go, Wearables,
Widget, 3-D Touch
Less consistent than card
Android & iOS
25
![Page 26: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/26.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Apple June Announcement
ASSA ABLOY will leverage its expertise in mobile access to support Apple’s efforts to make it easier to access dorm rooms with
contactless student IDs
Nico DelvauxCEO; ASSA ABLOY
![Page 27: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/27.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Mixed PopulationsMobile Devices with Legacy Credentials
![Page 28: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/28.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Benefits of Mobile Access
More User Convenience
Greater Operational Efficiency
Higher Security
![Page 29: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/29.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Benefits of Mobile Access
More User Convenience: Enable building occupants to use smartphone, tablet, or wearable to enter controlled areas
Fewer items to carry
Lost or forgotten cards no longer a problem
Remote, over-the-air credentialing
Extended read range for special applications
Adds to perception of innovative environment
No online connectivity required; Background operation
![Page 30: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/30.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Benefits of Mobile Access
Greater Operational Efficiency: Make physical access administration easier with digital, online processes
Physical credential management transforms to digital experience
Over-the-air credentialing of remote workers and visitors
Streamlined operations with easy integration to PACS, visitor management, and other systems
Sustainable process with reduced waste and lower carbon footprint
![Page 31: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/31.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Benefits of Mobile Access
Higher Security: Provide higher levels of authentication
Seos technology used to secure credential
Mobile devices are rarely forgotten, lost, or stolen
Missing mobile devices are reported almost immediately
Easily de-provision unauthorized devices; revoke credentials over-the-air
Applications can be protected with biometric and/or passcode
Vulnerabilities can be addressed quickly through remote update
![Page 32: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/32.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Common Concerns About Mobile Access
Won’t Work with Dead
Battery
No Visual Authentication
of Identity
![Page 33: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/33.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Simple and Free to Register
https://managedservices.hidglobal.com/faces/maUserOnBoardingStart
![Page 34: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/34.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
How to UpgradeSteps to UpgradeBest PracticesCation Areas
![Page 35: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/35.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Migration Options – Pros/Cons
Single Tech Cards Cost neutral credentialsReconfigure all readers More expensive readersReplace all credentials
Multi Tech Cards Readers First
Replace only remaining legacy credentials
Reconfigure all readersMore expensive readers
More expensive credentials (temp)
Multi Tech Cards Credentials First
No reconfiguration of readersLess expensive readers
Replace credentials only onceRisk appropriate reader upgrades
More expensive credentials
![Page 36: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/36.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
How to UpgradeBest Practices
Site survey and complete inventory of existing
technologies as a first step
Support as few legacy technologies as possible
Choose new solution capable of mobile access
Build your own mobile app
Start small – execute successfully at one
building, then repeat
![Page 37: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/37.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
How to UpgradeCaution Areas
Don’t procrastinate: Set target dates for completion
Consider and manage performance expectations
Use common, managed credential format
Set expectation for reader hardware refresh cycle
Validate service provider security assertions
– Ask about key management practices
– ISO27001 Certification
![Page 38: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/38.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
Invest in Solutions that Demonstrate Choice
Supports:
– Cards and Mobile Devices
– Smartphones, Tablets, and Wearables
– Multiple Secure Element Hardware Platforms
– iOS, Android, and Other operating systems
– NFC, Bluetooth, and beyond
Independent of:
– Transaction System
– Access Control Host
– Reader/Credential service provider
![Page 39: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/39.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
![Page 40: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision](https://reader033.fdocuments.us/reader033/viewer/2022042307/5ed3c6facef4dd68db683061/html5/thumbnails/40.jpg)
© HID Global Corporation/ASSA ABLOY AB. All rights reserved.
An ASSA ABLOY Group brand
For more informationBrandon Arcement - [email protected]
Brett St. Pierre - [email protected]