The secure management of access via mobile credentialing extends far beyond physical access and the opening of doors: virtually any piece of infrastructure or machine with restricted logical access for specific users at specific times cant take advantage of well-established mobile access control technology.
Read the full article in the Feb. 2022 issue of International Security Journal.