Welcome back to Sentry Interactive’s ‘Unlocking Access Innovation’’ newsletter where we provide a round up of our latest insights surrounding the next generation of NFC mobile access as a software only upgrade.
Make sure to subscribe now so that you never miss an update!
In our second edition we explore the power of active smartphone NFC technology and its innovative use-case for taking payments and mobile access. We look into how prox access control system investments can be extended with interoperable mobile credential technology. Finally, we provide our insights to why you should think twice about upgrading to a BLE mobile access solution.
How NFC technology is turning smartphones into payment terminals

NFC-enabled mobile apps like Square, Alipay+, Stripe, SumUp and others are transforming smartphones into payment terminals. This shift boosts flexibility for small merchants and pop-up retailers with the ability to offer card payments by simply using a mobile app.
Using the smartphone’s in-built NFC capabilities is not only being used by payment terminal mobile apps. Learn more about how it’s being used for mobile door access in a new and innovative way.
The interoperable mobile credentialing solution for proximity access control systems

Large commercial real estate firms, university campuses, healthcare systems and more are under pressure to provide, secure, and mobile first experiences for their tenants, members and students, but they don’t want to face completely replacing their existing prox access control system, involving high costs, long installation times and a negative environmental impact.
With interoperable mobile access software upgrading a proximity access control system to a mobile access solution doesn’t have to involve rip and replace.
What if access control manufacturers could provide mobile access across their entire proximity install base without replacing a single wall reader?
Why You Should Think Twice About Choosing Bluetooth (BLE) for Mobile Access

Bluetooth (BLE) has previously been known as a secure and convenient option for mobile access, but it’s not without its limitations. This article takes a look into why BLE falls short when it comes to consistent performance, user experience, and most importantly… security.
We highlight potential vulnerabilities such as passive sniffing, device spoofing, and inconsistent reader responses, and suggest what to look for when choosing a more robust mobile access alternative.
Extras: In Case You Missed It

Download Our Free Guide For Access Control OEMs.
Thanks for reading our second edition of ‘Unlocking Access Innovation’.
Subscribe or get in touch to learn more.


