Why we built EntryBit — rethinking access control
The story behind a cloud-native take on physical access control — and why we think the category was long overdue for a rewrite.
Zero trust for physical security
How zero trust principles like continuous authentication, micro-segmented zones, and just-in-time access are reshaping physical access control.
Scaling to 1,000 sites with zero downtime
Cell-based architecture, blast radius containment, and offline resilience — how we scaled access control across four continents.
Designing audit logs you can actually trust
How tamper-evident hash chains change incident response and what we learned implementing them in production.
Visitor management: from lobby chaos to concierge
How modern visitor management transforms front-desk operations with pre-registration, digital NDA signing, auto-expiring badges, and lobby analytics.
Mobile credentials: the end of the keycard
What we learned shipping Apple Wallet and Google Wallet credentials to 50,000 users across 40 sites.
Biometric access control and privacy: a guide
A practitioner's guide to deploying face recognition and fingerprint readers while respecting biometric privacy regulations.
Security from day one: trust baked into the stack
How we built enterprise-grade security controls into our infrastructure from our first commit — and what we would do differently.
Building real-time event streams at sub-50ms
A deep dive into our WebSocket architecture, back-pressure handling, and how we achieve consistent low latency.
Hardware-agnostic access control matters
Why we refuse to lock customers into proprietary controllers — and what it took to support every major protocol.