Putting mobile devices to work as tools for secure access is more convenient for users, easier for enterprises to manage, and more secure than older generation technologies. This will create many opportunities for the convergence of network and physical security that are simply unavailable with legacy access tools.