Welcome back to Sentry Interactive’s ‘Unlocking Access Innovation’ newsletter where we provide a round up of our latest insights surrounding software-based NFC mobile access solutions and more.
In our 4th edition we explore how clubs are offering their members and guests the choice of mobile credentials stored in their club app to unlock doors, without any access control hardware replacements.
We look at the evolution of iOS and Android NFC technology and its use cases beyond contactless payments.
Finally, we highlight the importance of cybersecurity when choosing a cloud-based software solution for mobile access.
Make sure to subscribe now so that you never miss an update!
How clubs are providing their members with mobile credentials in their existing club app, without access control hardware replacements via interoperable software.

Clubs now have the choice to add mobile credentials to their existing management platform as a feature via a straightforward cloud-based software integration. This means all their keys can be stored digitally within the club app they use to book facilities, manage their memberships, and more, from platforms like ForeTees . Mobile credential access permissions can also be automated and synchronised with other features, making operations life much easier.
Interoperability and the convergence of technologies is making this possible. Find out how clubs can now turn their members’ mobile phones into NFC access credentials, all via an open SDK integration.
What can NFC technology be used for other than contactless payments

Near Field Communication (NFC) technology is widely known for being the technology used for tap-to-pay contactless payments. iOS and Android in-built NFC capabilities made it possible for payments to be made using smartphones.
In-built smartphone NFC technology can be used for a lot more than making payments with your phone demonstrated by leading companies in various verticals such as BMW, Disney, and others.
Check out the other use cases for NFC technology surrounding access, identification and more.
The importance of cybersecurity in the evolution of mobile access

Upgrading to mobile credentials maximizes user convenience and safety, but only if it’s implemented securely. In this article, we share our insights for safeguarding your cloud-based mobile credential deployment from day one.
Topics include, secure mobile credential provisioning, encryption, and the importance of not relying on reader hardware. If you’re making the shift to a cloud-based mobile access solution, you should think about the levels of cybersecurity first.
Thanks for reading our third edition of ‘Unlocking Access Innovation’.
Subscribe or get in touch to learn more.