- Can I grant access to people outside my organisation?
- Yes, you can grant temporary or permanent access to people
outside your organisation. You can also restrict the times and
days when they have access directly from your dashboard.
- Can I revoke access?
- Yes, absolutely. You can revoke access at any time for an
individual user, or for an entire group, from your dashboard.
Revocation is effective immediately, no need to go out and
re-program the sensors.
- How secure is this, really?
- Very secure. Proxy uses strong cryptographic protocols in
combination with a one-time tokenization scheme that ensures that
your user's credentials cannot be intercepted and stolen, because
they are never transmitted over the airwaves.
- I heard that Bluetooth locks can be hacked.
- That's not a question. Nevertheless, many Bluetooth-based
locks have indeed been hacked. However, we at Proxy take your
security very seriously. We have addressed all common attack
vectors against Bluetooth-based locks, and would be happy to
discuss the details with you.
- Can I configure the range of the sensor?
- Proxy sensors can be operated in two modes: hands-free mode,
where a person is detected from a distance and the door unlocked
as they approach, and two-factor mode, where the person must
unlock their phone and explicitly trigger the door. These modes
offer a balance between added security and convenience.
- How does hands-free mode work?
- Hands-free mode allows our sensor to detect the user's phone
and verify access permissions at a distance, unlocking the door
just as the user approaches without sacrificing the security of
the user's credentials. We think it is quite magical.
- Hands-free mode sounds scary, can I restrict that?
- Hands-free mode uses the same one-time tokenization scheme to
keep your credentials secure. If you still wish to disable it and
require your users to pull out and unlock their phones instead,
you can do that on a per-door basis from the dashboard.
- What if my employee's phone is lost or stolen?
- We suggest that you take the same precautions you would for
securing any other sensitive information: revoke the account on
the compromised device, and remote wipe.