Remote virtual key sharing
Whether you’re expecting visitors, contractors, or issuing a digital ticket for out of hours staff, remote digital key sharing allows admins to share time-limited mobile visitor passes.
No new hardware or physical credentials are required and your visitor doesn’t even need to download an application.
Eliminate plastic door passes, go digital
Throw away plastic key cards and welcome digital keys. Issue multiple guests with controlled mobile access permissions for an event from anywhere, at any time, at the touch of a button.
Eliminate the risks of lost or stolen plastic visitor passes and enjoy a digital first solution with banking level cloud security. Digital tickets are automatically revoked at the end of the allotted time period preventing future security breaches.
How digital visitor credentialing works
Invite
The host invites the visitor to attend for a meeting at a specific time and date.
Approve
The visitor is then approved for a specific date, start and finish time by the assigned building admin.
Access
The visitor arrives, opens the email invite and scans the QR code on the Sentry Interactive tile or enters via NFC using the app.
Control
The visitor only has access to the doors the admin has allocated to them. The host can control access remotely, at any time.
Make your end users life easier, reduce admin time and costs
At the end of the visit digital visitor passes are automatically revoked at the expiry time set. Access can also be removed manually if necessary. Visitor passes are great for digital ticketing events, providing access to temporary visitors such as contractors, or for tradesmen requiring access to sites.
Best of all, our readerless NFC mobile credentials can work alongside legacy access control systems, meaning no new reader hardware is required.
Seamless, secure, and reliable access
Sentry Interactive’s readerless mobile access solution is engineered for comprehensive security, utilizing a standards-driven development process to decrease risk.. Military-grade encryption protects user access data in the cloud, while audit logging and privacy regulation compliance further secure the data.
Ready to go?
Find out more about our readerless mobile credential technology and how it can provide the key to mobile for your end-users .