Key Takeaways
- In 2023, global physical security market revenue was $83.1B and is projected to reach $162.7B by 2030, according to Allied Market Research.
- The global access control market size was $11.5B in 2023 and is projected to reach $28.0B by 2032 (CAGR 10.7%), according to Coherent Market Insights.
- The global smart lock market was valued at $1.83B in 2022 and is projected to reach $6.12B by 2030 (CAGR 16.6%), according to Fortune Business Insights.
- In the UK, 5.5 million households use CCTV, per UK government data (CCTV ownership and usage surveys).
- In the US, approximately 60% of small businesses do not have cybersecurity insurance (not access control specific but adoption barrier), per Hiscox.
- In the US, 76% of organizations use some form of MFA, per Okta 2023 Workforce Report (workforce access controls).
- Verizon DBIR 2024: 26% of breaches involved credential misuse (which access control and authentication aim to mitigate).
- Verizon DBIR 2024: 19% of breaches involved stolen credentials (credential theft).
- Verizon DBIR 2024: 22% of breaches involved phishing (often leads to unauthorized access).
- NIST SP 800-63B defines Assurance Levels (AAL) 1, 2, and 3 for authentication.
- NIST SP 800-63B allows memorized secret maximum length restriction and recommends MFA for higher assurance; it defines IAL/AAL with numeric levels 1-3.
- NIST SP 800-63B: MFA requires at least two distinct authenticator classes (something you have, something you are, etc.).
- Badge credentials: Magstripe cards are commonly 125 kHz (LF) RFID; US standard widely used frequency.
- Proximity access control cards typically operate at 125 kHz (LF), per common OEM specs.
- MIFARE Classic uses 13.56 MHz (HF) contactless smart card technology.
Global access control and identity security are surging with MFA-driven, zero-trust growth.
Market size & growth
Market size & growth Interpretation
Adoption & usage
Adoption & usage Interpretation
Threats, breaches & vulnerabilities
Threats, breaches & vulnerabilities Interpretation
Standards, controls & technical requirements
Standards, controls & technical requirements Interpretation
Use cases & technologies
Use cases & technologies Interpretation
References
- 1alliedmarketresearch.com/physical-security-market-A15204
- 7alliedmarketresearch.com/video-surveillance-market-A05703
- 8alliedmarketresearch.com/intrusion-detection-systems-market-A13387
- 2coherentmarketinsights.com/market-insight/access-control-market-1518
- 15coherentmarketinsights.com/market-insight/passwordless-authentication-market-1853
- 3fortunebusinessinsights.com/industry-reports/smart-lock-market-102216
- 5fortunebusinessinsights.com/identity-and-access-management-market-105920
- 18fortunebusinessinsights.com/industry-reports/nfc-market-107930
- 25fortunebusinessinsights.com/industry-reports/building-automation-systems-market-103293
- 27fortunebusinessinsights.com/industry-reports/turnstile-market-105381
- 28fortunebusinessinsights.com/industry-reports/smart-home-market-101928
- 29fortunebusinessinsights.com/industry-reports/home-security-system-market-101931
- 30fortunebusinessinsights.com/industry-reports/electronic-article-surveillance-eas-market-105809
- 31fortunebusinessinsights.com/industry-reports/video-intercom-market-102262
- 4marketsandmarkets.com/Market-Reports/biometrics-market-706.html
- 11marketsandmarkets.com/Market-Reports/cloud-security-market-203895530.html
- 13marketsandmarkets.com/Market-Reports/zero-trust-security-market-202817815.html
- 14marketsandmarkets.com/Market-Reports/identity-security-market-212684377.html
- 17marketsandmarkets.com/Market-Reports/rfid-market-1325.html
- 21marketsandmarkets.com/Market-Reports/identity-governance-administration-igam-market-1017.html
- 22marketsandmarkets.com/Market-Reports/security-information-and-event-management-siem-market-248.html
- 6theinsightpartners.com/reports/door-access-control-systems-market
- 9imarcgroup.com/electronic-access-control-systems-market
- 16imarcgroup.com/smart-card-market
- 23imarcgroup.com/physical-security-market
- 24imarcgroup.com/professional-surveillance-market
- 32imarcgroup.com/building-entry-systems-market
- 10gminsights.com/industry-analysis/access-control-as-a-service-market
- 20gminsights.com/industry-analysis/managed-identity-and-access-management-market
- 12grandviewresearch.com/industry-analysis/application-security-market
- 19reportlinker.com/p06100177/Access-Management-Market.html
- 26precedenceresearch.com/access-control-readers-market
- 33gov.uk/government/statistics/crime-survey-for-england-and-wales-csew-reported-crime-and-csew-behavioural-data
- 34hiscox.com/insights/business/uk-us-and-others-small-business-cyber-risk-survey
- 35okta.com/resources/reports/workforce-identity-report/
- 36microsoft.com/en-us/security/blog/2023/11/07/security-signals-report-2023/
- 37microsoft.com/en-us/security/blog/2024/03/19/microsoft-researchers-find-mfa-fatigue-attacks/
- 55microsoft.com/en-us/security/blog/2021/08/02/security-mfa-every-organization-should-use-mfa/
- 60microsoft.com/en-us/security/operations/digital-defense-report
- 38support.google.com/accounts/answer/185839?hl=en
- 39duo.com/blog/state-of-authentication-2023
- 69duo.com/blog
- 40salesforce.com/resources/research-reports/identity/
- 41gartner.com/en/newsroom/press-releases/2022-08-04-gartner-identifies-top-security-predictions-for-2023
- 42ai.google/research/pubs/pub41452
- 43pages.nist.gov/800-63-3/sp800-63b.html
- 72pages.nist.gov/800-63-3/sp800-63c.html
- 73pages.nist.gov/800-63-3/sp800-63d.html
- 44iso.org/standard/80503.html
- 76iso.org/standard/77304.html
- 77iso.org/standard/83485.html
- 79iso.org/standard/76592.html
- 102iso.org/standard/44851.html
- 104iso.org/standard/62013.html
- 45cisa.gov/secure-our-world/multi-factor-authentication
- 46cisa.gov/shields-up
- 65cisa.gov/known-exploited-vulnerabilities-catalog
- 47ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf
- 48verizon.com/business/resources/reports/dbir/
- 49idsa.org/resources/
- 50cybersecurity-insiders.com/multi-factor-authentication-mfa-survey-2023/
- 51thalesgroup.com/en/global/identity-and-security/thales-reports/2024-data-threat-report
- 52proofpoint.com/us/resources/threat-reports/account-compromise-report-2022
- 59proofpoint.com/us/resources/reports/state-of-email-security
- 53learn.microsoft.com/en-us/entra/identity/conditional-access/overview
- 54learn.microsoft.com/en-us/entra/identity/authentication/howto-mfa-registration-policy
- 56rsa.com/en-us/resources/reports/
- 57gbg.com/resources/reports/
- 58ibm.com/reports/data-breach
- 68ibm.com/reports/x-force-threat-intelligence-index
- 61transparencyreport.google.com/phishing/
- 62cloudflare.com/learning/security/what-is-credential-stuffing/
- 63owasp.org/Top10/A01_2021-Broken_Access_Control/
- 64enisa.europa.eu/publications/threat-landscape-2024
- 66cve.mitre.org/
- 67nvd.nist.gov/
- 70cifas.org.uk/fraudscape
- 71atlassian.com/trust/secure/report
- 74csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
- 75csrc.nist.gov/publications/detail/sp/800-92/final
- 84csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final
- 85csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final
- 86csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final
- 87csrc.nist.gov/publications/detail/sp/800-221/final
- 78bhmalabs.com/standards/
- 80securityindustry.org/
- 81standardscatalog.ul.com/ProductDetail.aspx?doc=UL294
- 82standardscatalog.ul.com/ProductDetail.aspx?doc=60335-2-76
- 83standards.iteh.com/
- 88pcisecuritystandards.org/document_library
- 89cisecurity.org/controls/v8
- 90hidglobal.com/
- 94hidglobal.com/technology/iclass
- 91nxp.com/products/identification-and-security/mifare/mifare-classic/mifare-classic-1k-2k-and-ev1-variants:MIFARE-CLASSIC
- 92nxp.com/products/identification-and-security/mifare/mifare-desfire/MIFARE-DESFIRE :MIFARE-DESFIRE
- 93nxp.com/technology/radio-frequency-technology/nfc-technology:NFC
- 95fidoalliance.org/specifications/
- 96w3.org/TR/webauthn-2/
- 97rfc-editor.org/rfc/rfc6749
- 99rfc-editor.org/rfc/rfc7519
- 105rfc-editor.org/rfc/rfc6238
- 106rfc-editor.org/rfc/rfc4226
- 98openid.net/specs/openid-connect-core-1_0.html
- 100docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.html
- 101datatracker.ietf.org/doc/html/rfc4120
- 103bluetooth.com/specifications/






