ProdataKey (PDK), manufacturer of the cloud access control platform built for mobile, now offers a unique wristband credential made of attractive, comfortable, and durable fabric. These stretchable, slip-on/slip-off wristbands are designed for users with an active lifestyle.

They’re ideal for schools, community centers, gyms, public pools, and other locations where users may not want to carry a phone, wallet, or traditional card or fob. Both rugged and waterproof, they can be worn during any activity.

The new PDK wristband credentials operate with all 125-kilohertz access control readers, including those manufactured by PDK and by competitors. They are available for order in lots of 25. Each measures 1 inch wide and is available with a 6 ½ inch or 7 ½ inch circumference.

Wristband credentials

With the introduction of our unique wristband credentials, PDK’s anytime, anywhere convenience extends to users who crave a seamless, untethered access experience.

They can enter secure areas and enjoy their favorite activities phone-free, pocket-free, and lanyard-free. Wearing a wristband is as easy as it gets,” says Brach Bengtzen, PDK's Director of Marketing.

Find out about secure physical access control systems through layered cybersecurity practices.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...