Access control systems & kits (1,028)

A fully supervised, addressable SDI/SDI2 bus device that allows access control integration for Bosch compatible control panels Direct interface to compatible Wiegand card readers On-board buzzer output and supervised on-board points Request to Exit and Request to Enter inputs that can have a shunt only option Four door states: Locked, Unlocked, Secured, Fire Unlock In a combination Fire/Intrusion system, it should not be used to lock doors used for emergency egress unless these doors have a mechanical release mechanism
Add to Compare
The IP based SMAX Access Control Management System From BQT is a sophisticated, intelligent and cost-effective security system, which manages the movement of staff and visitors within a building complex. SmaX can be managed and administered by any authorized individual, from any PC that has access to the network. The system is WEB browser based which means that the database and configuration remains within the SmaX hardware, offering a high level of data security and not requiring a dedicated PC. Individuals with the correct administration levels can manage remote sites from any location - obtaining reports, authorizing cards and changing access criteria, providing an ideal solution for multi site installations. Designed with the user in mind, setup and configuration are fast and the system is easy to manage - it's completely scalable and can be expanded as your needs grow. The SmaX management software enables the enrolment of Biometric and Mifare card Data at the click of a button, with the option of associating the cardholder photograph at the same time. The SmaX system has a single intelligent module to make the decisions at the door. Access permissions and transactions are carried out in these devices, which report directly to the main system in real time. If the Network fails at any point, these devices ensure system continuity without comprising security. Smax reduces the cost and stress involved in the management of staff and building security. New European website has been launched. To visit, click here.
Add to Compare
A key cabinet designed to program and dispense up to 20 keys The keys are stored in the secured vault in an unprogrammed state until an approved PIN and/or RFID card is presented After the presentation of an approved PIN and/or RFID card the vault programs a key with that user’s access permissions and releases the door latch Reads the ID of most unencrypted 13.56 MHz RFID cards and recharges keys while in the vault The front of the vault contains an RFID reader with an indicator light and keypad, as well as an LCD touchscreen Can be scalable, meaning numerous vaults can communicate within a single CyberAudit Enterprise system Designed and developed to meet security needs of medium to large scale facilities
Add to Compare
The Reader interface to the personal computer via a standard USB cable (incorporated into the reader). One of the features of this reader is that it operates on a plug and play basis due to the USB standard it complies to. The reader works in conjunction with the Wavetrend Active RFID Tags. The enclosure was designed in such a way that it enhances the esthetical value of that individual’s desk. The user is able to select only one tag via software and monitor that specific tag, or monitor a few tags, which was selected by the user at installation.
Add to Compare
WAVETREND’s unique logical PC access control system which provides personalised access for users authorised to use a particular computer. The Active Identification Tag transmits a unique code at constant intervals. The reader (plugged into the serial or USB port of the computer) then reports the presence of all tags in the environment to the control computer. Because each Tag has a unique code, the software can be configured to recognise specific codes. While the unique code is being read from an authorised tag, access to the computer is available. As soon as that unique tag is not present, the access control screensaver activates, hiding the information on the screen and restricting unauthorised access.
Add to Compare
The EZ-Eight Series are complete access control systems designed for fast and easy installation. All required components (software, controller, readers, reader interfaces, UPS, backup battery, enclosure and 2 test cards) are included. The installer only needs to provide electrical locking devices and cabling to complete the installation. Compact 16 x 18 x 5 enclosure fits all components. 30,000 users with 1MB of RAM (included). 8 auxiliary alarm inputs & 8 relay outputs.
Add to Compare
The EZ-32 Series are complete access control systems designed for fast and easy installation. All required components (software, controller, readers, UPS, backup battery and enclosure plus 2 test cards) are included in the package. The installer need only provide electrical locking devices and cabling to complete the installation. Compact 16 x 18 x 5 enclosure fits all components. 30,000 cardholders with 1MB of RAM. 1 auxiliary alarm input & 1 relay output per reader.
Add to Compare
As the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to Compare
As the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to Compare
CEM Systems DIU/700/231 offers a complete IP based access control solution that eradicates the need to provide local mains power at the door. The unit installation is classed as low voltage and can be completed by IT network installers without the expense of an electrician or electrical contractor.
Add to Compare
As the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to Compare
As the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to Compare
The 16-zone expander board provides an additional 16 zones inputs for the universal expander, along with extra detector power supply connections to simplify device wiring. The board is installed within the universal expander enclosure and connection is made via the ribbon cable supplied. All communications and power requirements for the board are provided by the host Universal Expander module. Other properties include detector power output required, no additional enclosure required and provides a cost effective zone expansion option.
Add to Compare
The universal expander module connects to an Inner Range system to provide an additional 16 zone inputs, 8 auxiliary outputs and 2 siren drivers. Up to 64 expander modules can be installed in an IR 3000 or IR Access 4000 system, depending on the memory option fitted to the control module. The optional lift interface board enables extensive control and monitoring of lift car operation and floor access. Other features are on-board diagnostic LED’s; fuse protection of LAN/detector/siren outputs/battery circuit, and system inputs monitor power supply, fuse and battery status.
Add to Compare
The Monitor XL Elevator Control Package provides powerful flooraccess Each package consists of three components. The Elevator Control Module is the main controller used to control the readers and send relay commands to the various relay modules.control supporting both Wiegand and magnetic stripe card technologies with a maximum of 64,000 cardholders.
Add to Compare
Offers a significant increase to key update speed when paired with a CyberKey Authoriser Hub 2 and is fully compatible with all CyberKeys Serves as the interface between CyberLock hardware and CyberAudit management software Indoor/outdoor installation
Add to Compare
A two-key vault that stores, secures, and programs up to two CyberKey smart keys Simply input a PIN and/or scan an RFID card The vault will program a key based on the credentials presented and the vault door will unlock It is also scalable, which means multiple vaults can communicate within a larger CyberAudit® Enterprise system
Add to Compare
As the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to Compare
As the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to Compare
As the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to Compare
As the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to Compare
Manages the information of up to 65,000 cardholder (upto 40 different access profiles) and more than 10,000 events. Access cards and profiles, schedules and events are stored internally. No single point of failure - in case of a network failure the controllers remain operational and continue to save the events internally. Remote management and secured access to the axesplus service platform via the Internet.
Add to Compare
CyberLock CKS-020 USB station is a docking station that allows communication between CyberKey smart keys and CyberAudit management software. In addition, the USB Station acts as a recharger for the lithium-ion polymer battery in rechargeable CyberKeys. The USB Station is compatible with all CyberKey smart keys.
Add to Compare
Provides 230 VAC power for 2 locks, ScramblePads, ScrambleProx & MATCH. 16Amps inrush & 300mA holding current per lock. 2 heavy-duty relays (1 powered, 1 dry) per lock. Includes lockable enclosure, transformer, & batteries.
Add to Compare
Remote networking solution to utilise USB over IP technology, combining the ease of installation, performance and reliability of USB with the convenience of networking. Supports data rates up to 12 Mbps for USB device attachments. 500mA downstream power per device. USB 1.1 compatible. Plug and play compliant.
Add to Compare
The PAC RS232-Six Wire Bus Interface allows you to interface PAC’s proprietary bus system to other 3rd party communication media such as fibre optic links. These can be used to greatly increase the “cable” distances between controllers. The RS232 Interface comes in a robust steel case. A maximum network latency of 20ms is allowed between the transceiver modules. The interface provides an 11-bit data packet which comprises 1 start bit, 9 data bits and one stop bit. This means that it will normally be used with an unbuffered transceiver. Power to the unit is supplied from the Six Wire Bus. Five year guarantee against electronic failure.
Add to Compare
Ring buffer for 2,000 entries. Slot for RS 485 interface (5-wire) for connection to interface converter. RS 232 interface for connecting a notebook (stand- alone solution). Connection for an external reader (magnetic, chip card or contactless readers). The ACT includes the following connections: 1 reader with LED display and 2-wire keypad, 1 door strike relay, 1 alarm relay, 1 door strike button, 1 door monitoring contact, 1 to 300 persons door release with 1) only card; 2) only PIN code; 3) card and PIN code; 4) card or PIN code, 4 access authorisations per person; time; day and door indication.
Add to Compare