Rethink Credentials

Rethink Credentials

Access control readers have been around commercially since the 1980s, along with physical badge credentials to open doors. Initially, these were magstripes, then proximity cards, then smart cards. The problem is, however is, these are still cards. Plastic cards that identify who you are, and where you work. In a world where technology is being innovated faster than ever before more sustainable alternatives are required.

The smartphone has provided the ultimate handheld user experience without which no one can leave their home. Now holding the ability to store keys and access buildings, businesses and university campuses have no choice but to keep up with the times and implement mobile access credentials instead of the traditional plastic credentials that face the risk of being lost and stolen and cost organizations time and money.

Do You Still Need a Badge and Reader to Open a Door?
Physical credentials have always meant physical wired readers needed to accompany them, creating a double cost.

Many companies have shifted to incorporate multi-technology readers into their product mix to provide a migration pathway from cards to mobile access, this solution adds further ‘upgrade’ cost. Up until now, mobile access has still required an access control reader.

Turning Access Control on its Head with Readerless Technology
Sentry Access uses the user’s smartphone’s NFC to perform the role of the reader by verifying the credential with the help of the wireless Sentry Access NFC tile interacting with Sentry interactive’s cloud infrastructure, the buildings controller and the access control server.

Effectively, the Sentry Access wireless self-powered NFC tile takes the role of the fob or keycard in a traditional access control sense. The user’s credential is registered as a secure digital key for the specific doors they have been granted access to, preventing unauthorized users from gaining entry.

Sentry mobile access is inherently more secure than a physical credential which can be easily lost, shared, stolen or cloned. If a smartphone is lost or stolen it fails over into a secure state, as is supported by multi-layered authentication through biometric fingerprint or facial recognition to unlock.

Badgeless, Readerless and Frictionless
Sentry Interactive offers customers a frictionless cloud-based access control platform, providing mobile access credentials to keep the company safe and secure. The mobile credential removes the PII concerns, creating a safe and secure user experience for the employee.

With Sentry Access, Sentry Interactive innovates access control, enhances user experience, and strips out the need for readers, and the hardware and installation costs associated with them.

This article originally appeared in the May / June 2023 issue of Security Today.

About the Author

Jason Bohrer is the CEO of Sentry Interactive.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3