{"id":1611,"date":"2022-04-27T01:24:37","date_gmt":"2022-04-27T01:24:37","guid":{"rendered":"https:\/\/torus-technology.com\/us\/?p=1611"},"modified":"2025-08-19T06:08:29","modified_gmt":"2025-08-19T06:08:29","slug":"5-emerging-access-control-trends-to-keep-your-eye-on-in-2022","status":"publish","type":"post","link":"https:\/\/torus-technology.com\/beta\/5-emerging-access-control-trends-to-keep-your-eye-on-in-2022\/","title":{"rendered":"5 emerging access control trends to keep your eye on in 2022"},"content":{"rendered":"<h3 class=\"wp-block-heading\">Access control is evolving fast. The pandemic prompted us to rapidly adopt (and create) new technologies for work and safety purposes. The result? Modern solutions to old problems have become simpler, faster and lower cost.<\/h3><h3 class=\"wp-block-heading\">Let\u2019s look at the top 5 trends on the rise across access control in 2022.<\/h3><h2 class=\"wp-block-heading\">Mobile phones become the new key cards<\/h2><p><a href=\"https:\/\/www.bankmycell.com\/blog\/how-many-phones-are-in-the-world\"><span style=\"color: #3366ff;\">According to recent statistics<\/span><\/a>, 83.7% of the population now own a smartphone.<\/p><p>Recognising that, many organisations are equipping their employees\u2019 devices with mobile badges to access buildings and facilities. This is <em>huge<\/em> for efficiency and useability.<\/p><p>Traditional key cards are easy to lose and even easier to forget. But how many of us forget our phone when we leave the house?<\/p><p>Most key cards are also unencrypted, meaning they can be easily cloned. This isn\u2019t the case for mobile badges (the digital alternative), making them ideal for optimised security.<\/p><p>Finally, key cards are also made of plastic \u2013 and all too many end up in landfill each year. The move to mobile access control is a move towards sustainability.<\/p><h2 class=\"wp-block-heading\">Companies unify their systems \u2013 as REST API adoption skyrockets<\/h2><p>According to <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/rapidapi.com\/wp-content\/uploads\/2021\/12\/2021-Developer-Survey_Report.pdf\">RapidAPI\u2019s 2021 Developer Survey Report<\/a><\/span>, 61.6% of web developers relied more heavily on APIs in 2021 than in 2020.<\/p><p>And a massive 90.5% of web developers expected their reliance to grow or remain the same in 2022.<\/p><p>This was true across multiple industries, from Financial Services to Healthcare.<\/p><p>RapidAPI\u2019s survey responses referred to API in its many forms (like SOAP, Gafka and Async). But their report also clearly shows that Representational State Transfer (REST) API, with its simplicity and lessened bandwidth demand, is the most popular choice across sectors.<\/p><p>Thanks to this widespread adoption of REST API-based infrastructures, companies can now unify their many online platforms under <em>one<\/em> system. This enables their <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/torus-technology.com\/us\/integration\/\">access control solution<\/a><\/span> (like Gallagher, Integriti or Genetec) to be their \u2018master\u2019 system.<\/p><p>Torus, for example, plugs seamlessly into an access control system so that building and facility managers don\u2019t need to maintain yet <em>another<\/em> system.<\/p><p>Instead, they can change permissions, create new users and carry out all sorts of admin duties from their existing platform \u2013 which automatically updates Torus and all their other systems.<\/p><p>It\u2019s easy to see why REST API is on the rise.<\/p><h2 class=\"wp-block-heading\">The cloud becomes the cornerstone of access control<\/h2><p>The \u2018cloud\u2019 lets users upload and store data in remote servers instead of hard drives and physical servers.<\/p><p>On an industrial scale, those older methods of storage take up a lot of physical space \u2013 which is just one reason more companies are moving to cloud-based access control systems.<\/p><p>Another reason is that cloud-based systems can be managed remotely \u2013 letting administrators carry out their daily management tasks from anywhere in the world. This is an invaluable feature in this <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/torus-technology.com\/remote-key-management-the-overlooked-but-crucial-part-of-your-hybrid-work-strategy\/\">new age of hybrid work<\/a><\/span>.<\/p><p>Plus, because they don\u2019t require any local hardware, cloud-based solutions can scale from one site to many with ease.<\/p><p>In 2021, <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2021-04-21-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-grow-23-percent-in-2021\">Gartner predicted<\/a><\/span> global investment in the public cloud would grow by 23% in the year ahead. Today, <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending\">Gartner expects<\/a><\/span> \u201cmore than half of enterprise IT spending in key market segments\u201d to move to the cloud by 2025.<\/p><p><a href=\"https:\/\/www.upwork.com\/resources\/moving-to-cloud\"><span style=\"color: #3366ff;\">Cheaper, more scalable and more sustainable to boot<\/span><\/a>, it\u2019s easy to see why a move to the cloud is such a strong trend for 2022.<\/p><h2 class=\"wp-block-heading\">Legacy systems reach their expiry date<\/h2><p>As access control systems move from hardware to software, legacy technology is falling behind.<\/p><p>These older, outdated computer systems are reliable in that they still do what they\u2019ve always done. But because they can\u2019t connect to newer systems \u2013 like those that are cloud-based \u2013 they hinder organisational growth.<\/p><p>Legacy technology is also becoming risky. The low-frequency cards they use are easy (and cheap) to clone, exposing workplaces to security breaches.<\/p><p>But the business world is waking up to all of this. Organisations are upgrading to more modern access control systems to bring their security and efficiency up to 2022 standards.<\/p><h2 class=\"wp-block-heading\">Touchless access becomes the gold standard<\/h2><p>When COVID-19 hit \u2013 and keeping surfaces bacteria-free became vital \u2013 contactless technologies became the heroes of access control.<\/p><p>And in 2022, they\u2019re here to stay.<\/p><p>Facial recognition technology is one of the most common solutions in this category. (Smartphone users will already be familiar with it.) But there are many other contactless biometric technologies on the market.<\/p><p>Iris and voice recognition are among them \u2013 and even touchless fingerprint technologies are emerging.<\/p><p>As demand for these technologies has climbed, they\u2019ve become far more accessible. They\u2019re now the first choice for access control.<\/p><p><strong>Want to bring <em>your<\/em> access control technology into 2022? Take a step towards maximum efficiency and security. <\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Access control is evolving fast. The pandemic prompted us to rapidly adopt (and create) new technologies for work and safety purposes. The result? Modern solutions&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1633,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 5 Access Control Trends for 2022 | Torus USA<\/title>\n<meta name=\"description\" content=\"Discover the top access control trends for 2022\u2014from mobile access and REST API to cloud and contactless tech. Stay ahead with insights from Torus.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/torus-technology.com\/beta\/5-emerging-access-control-trends-to-keep-your-eye-on-in-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 Access Control Trends for 2022 | Torus USA\" \/>\n<meta property=\"og:description\" content=\"Discover the top access control trends for 2022\u2014from mobile access and REST API to cloud and contactless tech. Stay ahead with insights from Torus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/torus-technology.com\/beta\/5-emerging-access-control-trends-to-keep-your-eye-on-in-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Torus\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-27T01:24:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T06:08:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/torus-technology.com\/beta\/wp-content\/uploads\/2022\/04\/Blog-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"676\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"trent.loebel@cictechnology.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"trent.loebel@cictechnology.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 Access Control Trends for 2022 | Torus USA","description":"Discover the top access control trends for 2022\u2014from mobile access and REST API to cloud and contactless tech. Stay ahead with insights from Torus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/torus-technology.com\/beta\/5-emerging-access-control-trends-to-keep-your-eye-on-in-2022\/","og_locale":"en_US","og_type":"article","og_title":"Top 5 Access Control Trends for 2022 | Torus USA","og_description":"Discover the top access control trends for 2022\u2014from mobile access and REST API to cloud and contactless tech. Stay ahead with insights from Torus.","og_url":"https:\/\/torus-technology.com\/beta\/5-emerging-access-control-trends-to-keep-your-eye-on-in-2022\/","og_site_name":"Torus","article_published_time":"2022-04-27T01:24:37+00:00","article_modified_time":"2025-08-19T06:08:29+00:00","og_image":[{"width":1366,"height":676,"url":"https:\/\/torus-technology.com\/beta\/wp-content\/uploads\/2022\/04\/Blog-4.jpg","type":"image\/jpeg"}],"author":"trent.loebel@cictechnology.com","twitter_card":"summary_large_image","twitter_misc":{"Written by":"trent.loebel@cictechnology.com","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/torus-technology.com\/beta\/5-emerging-access-control-trends-to-keep-your-eye-on-in-2022\/","url":"https:\/\/torus-technology.com\/beta\/5-emerging-access-control-trends-to-keep-your-eye-on-in-2022\/","name":"Top 5 Access Control Trends for 2022 | Torus USA","isPartOf":{"@id":"https:\/\/torus-technology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/torus-technology.com\/beta\/5-emerging-access-control-trends-to-keep-your-eye-on-in-2022\/#primaryimage"},"image":{"@id":"https:\/\/torus-technology.com\/beta\/5-emerging-access-control-trends-to-keep-your-eye-on-in-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/torus-technology.com\/beta\/wp-content\/uploads\/2022\/04\/Blog-4.jpg","datePublished":"2022-04-27T01:24:37+00:00","dateModified":"2025-08-19T06:08:29+00:00","author":{"@id":"https:\/\/torus-technology.com\/#\/schema\/person\/d1e94865231f21fe2289e6c6c3c7e4d2"},"description":"Discover the top access control trends for 2022\u2014from mobile access and REST API to cloud and contactless tech. Stay ahead with insights from Torus.","breadcrumb":{"@id":"https:\/\/torus-technology.com\/beta\/5-emerging-access-control-trends-to-keep-your-eye-on-in-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/torus-technology.com\/beta\/5-emerging-access-control-trends-to-keep-your-eye-on-in-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/torus-technology.com\/beta\/5-emerging-access-control-trends-to-keep-your-eye-on-in-2022\/#primaryimage","url":"https:\/\/torus-technology.com\/beta\/wp-content\/uploads\/2022\/04\/Blog-4.jpg","contentUrl":"https:\/\/torus-technology.com\/beta\/wp-content\/uploads\/2022\/04\/Blog-4.jpg","width":1366,"height":676},{"@type":"BreadcrumbList","@id":"https:\/\/torus-technology.com\/beta\/5-emerging-access-control-trends-to-keep-your-eye-on-in-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/torus-technology.com\/"},{"@type":"ListItem","position":2,"name":"5 emerging access control trends to keep your eye on in 2022"}]},{"@type":"WebSite","@id":"https:\/\/torus-technology.com\/#website","url":"https:\/\/torus-technology.com\/","name":"Torus","description":"Securely manage keys, cards and tags","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/torus-technology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/torus-technology.com\/#\/schema\/person\/d1e94865231f21fe2289e6c6c3c7e4d2","name":"trent.loebel@cictechnology.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/torus-technology.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/752e96cb12e29efb75bff70600acf2afbe77e1b3ed15132454f1576112ad7c4d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/752e96cb12e29efb75bff70600acf2afbe77e1b3ed15132454f1576112ad7c4d?s=96&d=mm&r=g","caption":"trent.loebel@cictechnology.com"},"url":"https:\/\/torus-technology.com\/beta\/author\/trent-loebelcictechnology-com\/"}]}},"_links":{"self":[{"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/posts\/1611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/comments?post=1611"}],"version-history":[{"count":5,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/posts\/1611\/revisions"}],"predecessor-version":[{"id":5463,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/posts\/1611\/revisions\/5463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/media\/1633"}],"wp:attachment":[{"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/media?parent=1611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/categories?post=1611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/tags?post=1611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}