News for the Access Control Professional


Access control cyber security

Cyber Remedies

By Scott Lindley
General Manager, Farpointe Data

As seen on Professional Security Magazine Online

Protecting your customers from hackers is imperative. Threats have grown from teenage mischief makers to sophisticated government-backed entities, and now, even advertising and analytics companies. Think Ferris Bueller, Iran and Quibi. With knowledge of what these hackers seek—and the straight-forward, undemanding remedies that are becoming available to thwart them—there is little reason not to incorporate basic cyber-security into your access control solutions.

Read More

P-640 Reader and Keypad

Multiple credentials—which use a smartphone's Bluetooth Low Energy (BLE) technology to communicate with Conekt mobile-ready readers—can be loaded into the Conekt Wallet App.

Product Spotlight: CONEKT® CMC-2 Mobile Credentials

With a convenient cloud-based delivery system and no physical credentials to inventory, Conekt mobile credentials are quicker and easier to order, distribute, and maintain.


  • Supports both industry-standard and custom access control formats
  • Delivered in the exact ID sequence ordered—no under- or over-runs
  • Options to private label—logo, graphics, text and more
  • Secured by AES encryption—proven data protection
  • Operates on Apple® iPhone® and Google® Android™-based smartphones

Data Sheet

Request a Free Sample

FAQ on Mobile Credentials

FAQ on Mobile Credentials

Mobile technology in access control applications is a growing trend, and integrators are well positioned to take advantage of its benefits. Secure data transfer, end-user convenience, support for multiple formats, and flexible system compatibility all combine to provide a wealth of opportunities for integrators.

Our FAQ on Mobile Credentials provides some guidance on mobile credentials and their use in access control.

Download Now

BEST logo

Switch Core

Switch™ Tech

Switch Tech makes it possible to add smartphone-based mobile access to virtually any small format interchangeable core (SFIC) lock application and then integrate these cores with electronic access control. Switch Tech's unique design and innovative functionality has been recognized by industry professionals. Explore how dormakaba and Switch Tech are making access control safe and secure.

Visit Website

Download Sell Sheet

Happy Thanksgiving

Please note that on Thursday, November 26 and Friday, November 27, Farpointe's offices will be closed in observance of the Thanksgiving holiday. From all of us at Farpointe, we wish you a happy and healthy Thanksgiving!

Have a question about something in The Reader, or about any of Farpointe's RFID readers or credentials?

Contact Us

Download recent issues of The Reader

OCT - Focus on Keypad Readers in Access Control Applications

SEP - Cyber Vulnerability in Access Control

AUG - Farpointe Products Verified to Meet OSDP Standards

JUL - Keep Your Identity to Yourself

Missed an issue of The Reader?

View Archives

Have The Reader delivered straight to your inbox:

Sign Up


© 2020 Farpointe Data, Inc. All rights reserved.