Locksmiths Embrace Electronic Access Control

April 1, 2025
Physical security continues to adopt mobile credentials, cloud-based access control, biometrics and AI

Locksmiths are embracing new technologies as they expand their traditional locksmithing offerings with electronic access control solutions and products, helping them grow and provide more value to their businesses.

The rapid rise of mobile credentials is well-documented and signals a gradual shift away from traditional access methods. For example, 61% of security leaders identify mobile credential proliferation as a top trend based on findings from HID’s 2025 State of Security and Identity Report, a comprehensive study that gathered responses from 1,800 partners, end users, and security and IT personnel worldwide. In addition, nearly two-thirds are either deploying or planning to deploy mobile solutions.

Concurrently, demand for biometric technologies such as fingerprint, iris, and facial recognition is also on the rise with about 35% of respondents currently using biometric technology, and another 13% planning to, indicating significant growth potential in this segment.

Artificial Intelligence, one of the hottest topics in security right now, is being rapidly adopted to enhance security operations. Use cases are proliferating across access control, identity management, video, and security management platforms, with key benefits cited including improved efficiency and speed of security processes (50%) and enhanced real-time data analysis capabilities (47%).

Embracing New Tech

With the public and security industry embracing all of this new technology, it is changing end users’ expectations for what is now possible when it comes to access control.

“This is the 4th year that we've conducted this survey, and we've asked somewhat similar questions, so that we can do some trends analysis over time, and we have seen an increased adoption of mobile credentials since we started the survey,” says Matt Winn, VP, Communications for HID. “We see it's continuing to grow in adoption and in use cases. So, yes you can leverage it for access control, but there are also a lot of different purposes you can use it for, whether it's Apple Wallet or Google Wallet. You can use it for secure time and attendance, your parking garage, so many examples.”

Winn uses the airport experience as a good example, where you can do everything from getting your boarding pass to checking in to getting onto the plane all with your phone.

“I obviously see the rise of mobile access and credentials because of the space I'm in, but when I was a locksmith, I was constantly seeing it as well because your phone is something that you have on you at all times,” says Lucas Mason, Technical Solutions and Marketing Specialist for Centrios, who spent nearly a decade working as a locksmith before joining ASSA ABLOY. “Oftentimes people, including me, have their phones on them more than they have their keys, so my phone being a key only makes sense.”

Beau Edelen, senior VP of Sales and Business Development, Lockmasters, agrees, noting, “There is a definite increase in interest in BLE and mobile phones as credentials. BLE is inexpensive, reliable, and proven as a valid credential type, so I expect to see this trend continue for years to come.”

Looking at verticals that seem to be early adopters, not surprisingly, higher education leads the pack.

“It’s interesting because obviously that user base is super mobile friendly – they've had their phones on them since they were very young, and so they've really come to expect that experience, including the multi-application use case,” says Winn. “We're also starting to see an uptick in healthcare as well.”

While mobile access continues to gain traction, “the demand for biometrics is still lagging,” says Edelen. “I think some of the early adopters of the integrated biometrics got burned by inconsistent product quality, long read times, and outrageous costs, which has kept many on the sidelines.”

Seeing is Believing

While mobile access may be a good fit for some, like higher education, there is still a need within many verticals for that physical identification, usually in the form of a badge or card.

“When we asked [survey respondents] if they continue to use cards, the majority of them said yes and that they plan to continue to do so,” says Winn. “And the number one reason for that was because they needed a visual identifier, especially in a vertical like healthcare or government, or you think of an airport staff worker. So, while we are seeing a proliferation and adoption of new use cases for mobile, the card remains important our findings show.”

Many are using mobile in tandem with other physical security options, so it becomes a mixed-use environment. “HID headquarters is a great example where not everyone is issued a company phone but they still want to have their card available so they can access the parking gate, access the factory, etc.,” Winn explains. “We really do believe that there is a long window where physical cards will remain, but they will be used in concert with mobile identities.”

Opportunities for Locksmiths

All agree that there is an opportunity here for locksmiths to help their customers to upgrade older or legacy systems to electronic access control and even get involved in new projects.

“As the locksmith provider for any given client, you have a level of trust that is difficult to copy,” Edelen astutely points out. “If they trust you with their master key system, they trust you with their security. Locksmiths should use that inside track to expand their business by offering low-voltage solutions of all types. The costs have come down and the ease of use has greatly improved in recent years.”

Mason agrees, noting, “There is absolutely an opportunity for locksmiths as you're able to provide an upgrade path for your customers that might not want to pay a lot of money, but really want to leverage things like mobile credentials, see event history, for example.”

Many are looking to move from stand-alone locking systems, such as key access or keypad access, to an electronic access control system that can provide additional value, interactivity and data.

“We are seeing a lot of small businesses wanting to get away from that stand-alone system to something that's smart and can give them features like access history, but they don't to pay the mid-tier or enterprise prices,” says Mason. “They really want to have access control that suits them without all the bells and the whistles because many times they can't afford them.”

Recurring Revenue

As the locksmithing community ventures into the world of EAC, they are open to the idea and see the benefits of recurring revenue model.

“This billing model is not new, but the locksmith industry has been very slow to adopt this model,” notes Edelen. “Obviously, the alarm industry has been enjoying this passive revenue for decades, and I think the public is more used to the idea of SAAS and paying as you go, which is likely helping to drive the increased usage by commercial locksmiths.”

He continues, “This is a fantastic way to increase revenue, grow the valuation of a locksmith business, and become more ‘sticky’ with clients of all types. The subscription model has now been proven, the public is aware and accustomed to it, so locksmiths should leverage that trend. The hardest part, for some locksmiths, is simply the billing process to track, maintain, and invoice customers, but there are many solutions on the market that do just that.”

A Unified, Software-driven World

As the HID report shows, there is a growing demand for unified security management solutions that streamline operations. As organizations diversify security technology, many security leaders (67%) are making moves to adopt software-driven security solutions, citing that unifying multiple data collection methodologies would be “somewhat” or “very important” (73%) to their organization, signaling a strategic focus on converging platform solutions rather than standalone products

Additionally, survey respondents report a shift toward software-driven security solutions that bridge physical and digital functions like video surveillance, access control, and intrusion detection into a more unified platform.

"The security industry is at a pivotal moment where the integration of modern technology with existing infrastructure is no longer optional — it's imperative," says Ramesh Songukrishnasamy, Sr. VP of Engineering at HID. "The fact that 73% of security leaders now prioritize software-driven unified solutions shows we've moved beyond traditional siloed approaches. Organizations are demanding platforms that can scale with their needs while providing actionable intelligence."

And as we have all seen firsthand, there is a strong preference for open platforms that facilitate seamless integration. “Interoperability has become synonymous with progress across the security industry over the last few years, and the trend continues as more than half of security professionals reported open solutions as being ‘extremely’ or ‘very’ important to their organizations,” according to the report.

The security channel is also undergoing significant transformation driven by digital innovation. While 77% of channel partners believe they are adapting well to these changes, growing end-user demand for AI, cloud solutions, IoT integration, and advanced analytics is reshaping service expectations, researchers point out, noting: “To thrive, the channel must continuously evolve and adapt to meet the evolving needs of the market and keep pace with digital transformation within the security sector.”

Finaly, the HID report sees a continued emphasis on sustainability in security decision-making, budget allowing. Sustainability is still a key factor in security decision-making, with 75% of security leaders now factoring it into their solution selection process. However, sustainability is not the most critical factor when selecting new solutions as security and cost-effectiveness are still the highest priority for 80% of integrators and consultants.

About the Author

Paul Ragusa | Senior Editor

Paul Ragusa is senior editor for Locksmith Ledger. He has worked as an editor in the security industry for nearly 10 years. He can be reached at [email protected].