
A Complete Guide To Access Control Credentials: Cards, Fobs, Wristbands & More
As security needs evolve, so do the technologies we use to manage and control access. At ICT, we’ve built a powerful, flexible access control ecosystem that supports a wide range of credential types — from traditional proximity cards to mobile credentials and rugged wristbands built for challenging environments.
Whether you're securing a single site, a large enterprise, or something in between, we make it easy to tailor your access solution with credentials that suit your users and environment — all seamlessly built into our Protege WX, Protege X and Protege GX systems.
What are access control credentials?
Access control credentials are used to confirm someone’s identity before allowing entry to a secure space. — whether it's a door, a gate, or a restricted area. These credentials can come in many forms, including physical items like cards and fobs, wearables like wristbands, or digital formats like mobile credentials.
Each credential carries a unique identifier that’s read by an access control device, verified by the system, and matched with the correct permissions. The result? Smooth, secure, and auditable access for authorized users — and complete peace of mind for you.
We offer a wide range of credential options to suit different environments, user needs, and levels of security — all designed to work seamlessly with our readers and access control platforms.

Card-based credentials
Cards are one of the most trusted and familiar forms of access control — and for good reason. They're cost-effective, easy to distribute, and widely understood by users, making them a reliable solution for securing everything from offices to large-scale facilities. We support both 125kHz proximity cards and 13.56MHz smart cards (including MIFARE and DESFire), so you can choose the level of security and functionality that fits your needs.
Whats the difference between proximity and smart cards?
Feature | 12kHz Proximity Card | 13.56MHz Smart Card (MIFARE/DESFire |
Security | Basic, easy to clone | High, with encryption and authentication |
Data Storage | Limited | Supports multiple applications |
Best For | Low-risk environments | Corporate and high-security facilities |
Our TSL readers are dual-technology by default, meaning you can run proximity and smart cards side-by-side. That makes it easy to migrate to higher-security credentials over time — no need to swap out your hardware.
Unlock smarter, seamless access with ICT
Explore our range of proximity cards, fobs, PINs, mobile credentials, and more to find the perfect solution for your needs.
Key fobs & Transmitters
If you prefer something more sturdy and compact than a card, our key fobs offer the same level of functionality in a pocket-friendly design. They’re ideal for staff who are always on the move or environments that require a durable and robust credential, like laboratories and factories.
We also offer 2-button and 4-button transmitters, perfect for controlling gates, garage doors, and other long-range entry points - perfect for logistics companies. They give you added convenience with custom control options — all backed by our access control system.
Wristbands built for active environments
In places where cards or fobs fall short — think gyms, construction sites, or pool areas — our IP68-rated silicone wristbands are a practical, comfortable alternative.
Why our customers love them:
Fully waterproof and chemical-resistant
- Durable to withstand high-heat, high-pressure environments
- Available in multiple sizes to ensure all-day comfort
- Compatible with both 125kHz and 13.56MHz systems
- Always on-hand (literally) — no need for pockets or lanyards
- Difficult for patients or unauthorized individuals to obtain in scenarios prone to snatch-and-grab incidents
- They’re especially popular in industries where cleanliness, durability, and ease of use are key.
Mobile credentials - access control in your pocket
Access control doesn’t get more convenient than mobile credentials. With our mobile credentials, your users can unlock doors using their smartphones via Bluetooth® or NFC — no need to carry a separate card or fob.
Here’s why mobile access is a smart choice:
Enhances protection: Tied to a unique, encrypted device
- More convenient: Your phone is always with you
- Instant updates: Issue or revoke access remotely, immediately
- Lower maintenance: No more lost card replacements
- Touchless entry: Great for high-traffic or hygiene-conscious sites
All of our TSL readers support mobile credentials right out of the box — no additional installation required.

Biometric & multi-factor authentication
For environments that demand the highest level of identity verification, our Protege solutions support integrations with leading biometric technologies — including fingerprint, facial recognition, and iris scanning.
These can be layered with our other credentials (like cards or mobile) to enable multi-factor authentication — ideal for secure zones like data centers, labs, and critical infrastructure.
Finding the right credential for your site
Not sure what’s best for your team or facility? Check out this quick reference to help you decide:
Credential Type | Best Suited For | Why It Works |
Proximity Cards | Offices, education, general commercial | Affordable and widely used |
Smart Cards | Healthcare, enterprise, high security sites | Secure, encrypted, multi-use |
Key Fobs | Mobile staff, small business | Easy to carry, durable |
Transmitters | Gate/garage access, fleet vehicle | Long-range control, multi-button options |
Wristbands | Gyms, construction, industrial | Wearable, waterproof |
Mobile Credentials | Smart workplaces, multi-site organizations | Touchless, secure, remotely managed |
Biometrics + Card | Government, high-risk access zones | Strong identity assurance |
Access Control 101: The ultimate beginner's guide to physical security
What does access control even mean? And why do you need to know about terms such as intrusion or integrated security? Download our ultimate beginner's guide to find the answers to this and more.
Seamless integration
No matter which credentials you use, they all work directly with our Protege platforms — no need for middleware or complex add-ons. You can mix and match across sites, transition gradually, and scale your access solution as your needs grow.
Our readers are built to support multiple credential types and each user can have up to 8 different credentials, giving you the flexibility to support all users — from visitors and contractors to high-level administrators.
Let's talk access control
Not sure which combination of credentials is right for you? We’re here to help. Whether you’re upgrading an existing system or building one from scratch, our team can guide you to a solution that fits your people, your environment, and your goals.
Explore our full credential range