Rethink Credentials

Rethink Credentials

Access control readers have been around commercially since the 1980s, along with physical badge credentials to open doors. Initially, these were magstripes, then proximity cards, then smart cards. The problem is, however is, these are still cards. Plastic cards that identify who you are, and where you work. In a world where technology is being innovated faster than ever before more sustainable alternatives are required.

The smartphone has provided the ultimate handheld user experience without which no one can leave their home. Now holding the ability to store keys and access buildings, businesses and university campuses have no choice but to keep up with the times and implement mobile access credentials instead of the traditional plastic credentials that face the risk of being lost and stolen and cost organizations time and money.

Do You Still Need a Badge and Reader to Open a Door?
Physical credentials have always meant physical wired readers needed to accompany them, creating a double cost.

Many companies have shifted to incorporate multi-technology readers into their product mix to provide a migration pathway from cards to mobile access, this solution adds further ‘upgrade’ cost. Up until now, mobile access has still required an access control reader.

Turning Access Control on its Head with Readerless Technology
Sentry Access uses the user’s smartphone’s NFC to perform the role of the reader by verifying the credential with the help of the wireless Sentry Access NFC tile interacting with Sentry interactive’s cloud infrastructure, the buildings controller and the access control server.

Effectively, the Sentry Access wireless self-powered NFC tile takes the role of the fob or keycard in a traditional access control sense. The user’s credential is registered as a secure digital key for the specific doors they have been granted access to, preventing unauthorized users from gaining entry.

Sentry mobile access is inherently more secure than a physical credential which can be easily lost, shared, stolen or cloned. If a smartphone is lost or stolen it fails over into a secure state, as is supported by multi-layered authentication through biometric fingerprint or facial recognition to unlock.

Badgeless, Readerless and Frictionless
Sentry Interactive offers customers a frictionless cloud-based access control platform, providing mobile access credentials to keep the company safe and secure. The mobile credential removes the PII concerns, creating a safe and secure user experience for the employee.

With Sentry Access, Sentry Interactive innovates access control, enhances user experience, and strips out the need for readers, and the hardware and installation costs associated with them.

This article originally appeared in the May / June 2023 issue of Security Today.

About the Author

Jason Bohrer is the CEO of Sentry Interactive.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3