1. DEMO Card:

This card is made for testing and evaluation. This configuration allows individuals to enroll their 2-fingers and lock the card temporarily for testing. Once the individual has completed the testing they can reset the card by placing the card on a reader and using anyone’s non-enrolled finger on the card for approximately 20-30 seconds (10 sets of flashes) Once the sets of flashes goes to individual flashes they can remove the card from the reader and it is now reset for another individual to enroll and test.

2. PRODUCTION Card:

This card enrolls exactly the same as the Demo card but once the enrollment is complete the card is PERMANENTLY locked to that individual. That is what we call ABSOLUTE TRUST and IDENTITY. Whenever this card is used you ABSOLUTELY know who used it.

3. CONTRACTOR/VISITOR Card:

This card enrolls exactly the same as the Demo card and is locked to the individual until the card is placed on a reader and the reset key is applied for 3-5 seconds to the sensor on the card. Once that is complete the card can be re-enrolled/re-used. This ensure the card can only be used by the registered person until the secure SentryKey is used to reset it. Typically these cards have a Visitor or Contractor General information printed on them and not a photo as you would not be able to reprint directly to the card.

Any access control system that utilizes HID, LEAF, LEGIC, DESIFIRE/MIFARE or FIDO2 credentials. Sentrycard is typically matched with the existing readers.

If you are ordering Elite Key or Corporate 1000 you have a 100 card minimum, the same as you would order today.

The end-user will need to complete and submit the HID authorization form directly to HID before we can begin manufacturing.

There are numerous reasons, starting with the understanding that a phone, although a convenient answer, is not a secure answer. 1) In the vast-majority of cases, phones are owned by the user and not the enterprise; 2) The user controls the loading of biometrics on the device; 3) Multiple biometrics can be loaded/changed on the device by the user; 4) Phones still utilize a back-door PIN code for access that can be shared/stolen; 5) Phones are always connected (Wi-Fi or Cellular) and thereby discoverable by bad actors; 6) Phones have innumerable other applications within them, allowing malware and back-door access to the device; 7) Phones aren’t allowed in most enterprises secure environments, call centers and other critical areas; 8) Imagine the number of different types of phones within an enterprise, all with potentially different levels of operating systems. What would the help-desk burden be to manage access control issues across so many different versions?

No, there’s no need for rip and replace. The SentryCard is completely open-architected, meaning that it is compatible with all leading access control systems, door readers, and readily connects to the Active Directory via commonly used software (Microsoft, OKTA, PingID, VeridiumID, Windows Hello, Google, Citrix, Azure, etc.) Sentry maintains an “agnostic” approach to access control and has the ability to integrate (or embed) any of HID’s technologies (Prox, iClass, iClassSE and SEOS) as well as the entire NXP MiFARE suite (MiFARE Classic, DesFIRE EV1 and DesFIRE EV2), allowing it to work with any existing readers.