Welcome to Sentry Interactive’s brand new – ‘Unlocking Access Innovation’ newsletter where we will provide a round up of our latest insights surrounding the next generation of NFC mobile access as a software upgrade.
In our first edition we explore the power of active smartphone NFC technology and its new innovative uses for identity verification and mobile access. We look into why interoperability is important for OEM manufacturers when they are choosing to integrate mobile access software. And finally, expose the security vulnerabilities of proximity access control system credentials that will make you want to upgrade to a more secure access solution.
The rise of smartphone NFC technology for ID verification and access

iOS and Android smartphone devices with in-built NFC are now being used to verify ID documents via certain applications. The ability to tap and scan electronic identity documents enables for a much faster, seamless, and error free process by eliminating manual data entry.
Using the smartphone’s in-built NFC capabilities is not only being used for the purpose of ID verification. Learn more about how it’s being used for mobile door access in a new and innovative way.
Why should access control manufacturers be choosing interoperable mobile credentialing software?

Interoperable software can provide access control OEMs with a cost effective and flexible mobile access offering. With the ability to roll out non-proprietary mobile access software quickly to multiple systems without extra integration fees,
We answer the question why access control manufacturers should be offering this type of software?
If you are still using proximity access control credentials? You might want to think about upgrading to a more secure solution

Proximity access control systems and prox credentials, still widely used by large enterprises and sites, and institutions, were never designed for modern security challenges. In this article, we explore the major risks associated with prox cards, including cloning, sniffing, and replay attacks that can be carried out with off-the-shelf devices.
We also break down why these vulnerabilities persist and what it means for organizations that rely on legacy infrastructure for secure access.
Thanks for reading our first edition of ‘Unlocking Access Innovation’.
Subscribe or get in touch to learn more.


