Access Controllers (733)
The DSX-1022 is an independent processing 2 door package designed to be a cost effective building block platform that allows expansion in a scalable manner. Each controller can be used in conjunction with all other DSX controllers as master or slave in the controller network. The DSX-1022 is compatible with Wiegand, Barium Ferrite, Proximity, Bar Code, Magnetic Stripe, and Biometric readers. The DSX-1022 has a standard configuration of 512K of Flash ROM and 512K of RAM. The DSX-1022 communicates with the WinDSX Communication Server via TCP/IP LAN communication, Direct Serial Port connect, and Dial-up Phone Modem.
Add to Compare
Provides power and flexibility with its 32-bit architecture, TCP/IP connection, flash memory, large local cardholder database, and largereader and I/O module support Provides off-line operation, making access control decisions independently from the network or Pro-Watch Software Supports a combination of I/O and/or reader boards to monitor alarm input points, relay output points and access control reader interfaces Supports up to 300,000 cards and 50,000 transactions
Add to CompareThe SALTO CU50ENSVN is an on-line door controller that can have 1 or 2 wall readers connected, has 2 control relay outputs and has SALTO Virtual Network (SVN) capabilities. Cards are automatically updated with the latest changes in the access plan, it records the user audit into the PC and provides advanced information on battery status. It also continually updates the cancelled ID carrier black list simply by using the cards on the network, distributing the latest access information throughout the building via the off-line stand alone locks.
Add to Compare
ACM board with rack enclosure Supports eight Wiegand, RM or OSDP readers, along with 24 supervised inputs and 16 outputs which can be individually wet- or dry-configured Embedded lock power management lowers installation costs Hardened Linux embedded OS for improved security and scalability Includes global anti-passback and advanced peer-to-peer clustering Native intrusion zone functionality LCD provides important controller status and diagnostics information Manages up to 500,000 cardholders in local memory Dedicated input for fire alarm interlock overrides door locks during fire conditions Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications
Add to Compare
The Kantech KT-2 is a two-door controller that supports two readers, incorporates Wi-Fi connectivity and can be configured in two user-friendly operational modes. The KT-2 can be used with the powerful EntraPass Security Management Software to provide more advanced and fully integrated access control features such as Wi-Fi connection. The addition of the built-in Wi-Fi antenna reduces installation time and costs while providing an ideal solution for projects with infrastructure designs that would traditionally require extensive cabling. Alternatively, the KT-2 builds on the KT-1 by continuing to support Standalone Mode, offering basic two-door security functions without the need to purchase or connect to a security management software.
Add to Compare
The S321-IP Intelligent Controller incorporates advanced technology and flexible features for small-to-large security installations. It uses standard IP communications protocol and is capable of monitoring and controlling two fully configured doors.
Add to Compare
The Kantech KT-2 is a two-door controller that supports two readers, incorporates Wi-Fi connectivity and can be configured in two user-friendly operational modes. The KT-2 can be used with the powerful EntraPass Security Management Software to provide more advanced and fully integrated access control features such as Wi-Fi connection. The addition of the built-in Wi-Fi antenna reduces installation time and costs while providing an ideal solution for projects with infrastructure designs that would traditionally require extensive cabling. Alternatively, the KT-2 builds on the KT-1 by continuing to support Standalone Mode, offering basic two-door security functions without the need to purchase or connect to a security management software.
Add to Compare
Includes General Controller Module, 2 Access Control Module Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware
Add to Compare
Custom Rules Processing - Use X200 in conjunction with custom rules engine on X1100 to create elaborate rules for handling input states Supervised/Unsupervised - Inputs Supervised inputs can support custom A-to-D conversion IO Module Encryption - Enhance security between intelligent controller and IO modules with AES encryption Crypto Chips - Protect against malicious attacks to keep keys and passwords safe Threat Levels - Define up to 7 different threat levels that are used to instantaneously adjust user access during lockdowns and lockouts Open Architecture – Work with a variety of software partners over time without any re-investment in hardware
Add to Compare
16 programmable relay outputs; 2 dedicated inputs AES 128/256 Data Encryption Easily integrates lighting, heating/cooling, door or elevator control systems Initiates commands by operator, by time schedules, or by events Built-in capacity to control and respond to external device commands Allows the clustering of up to 16 uniquely monitored devices easily and compactly RS-485 host connectivity High performance, reliable platform enables use of hardware with HID Mercury OEM partners software solutions Adds functionality and flexibility to existing access control systems Embedded crypto memory chip provides secured layer of encryption to protect sensitive data
Add to Compare
New, faster, and more intuitive user interface decreases time spent on deployment and training Embedded browser features basic access control such as securing doors, managing employee access and manage sites remotely Simple and easy to use Add MAXPRO® Cloud or WIN-PAK® for more advanced features, such as video and intrusion integrations, advanced reporting, rules and photo badging IP-based hardware with Power over Ethernet (PoE) PLUS capability eliminates additional network module wiring and simplifies powering the panel At-the-door mounting decreases cable runs Metal enclosure with included 3.5-Amp power supply and battery backup available for traditional installs or retrofits RJ45 connection for Ethernet, Interfaces, Readers and Doors Add additional panels and manage using the embedded interface via Ethernet Virtual Loop (EVL) or RS-485 loops On-board additional auxilary REX (Request to Exit) and Door Contact inputs per door (2X) enables turn style and double lock without extra hardware 256-bit AES encrypted communication between panel and hosts (browser, cloud, and WIN-PAK®) Security certificate capability ensures secure and trusted connections to the panel Panel tamper switches included on metal enclosures 128-bit AES encrypted bi-directional reader-panel communicating (OSDP:V2) protocol Embedded, cloud, or software-hosted capability from one panel
Add to Compare
16 programmable inputs; 2 programmable relay outputs AES 128/256 bit data encryption Configurable input parameters Initiates commands by operator, by time schedules, or by events Allows for easy and compact clustering of up to 16 uniquely monitored devices RS-485 host connectivity Allows standard and range-based supervision with end of line resistance High performance, reliable platform enables use of hardware with HID Mercury OEM partners software solutions Adds functionality and flexibility to existing access control systems Embedded crypto memory chip provides secured layer of encryption to protect sensitive data
Add to Compare
ACM board in 4U rack mount enclosure Supports up to eight Wiegand, RM or OSDP readers, 24 supervised inputs, and 16 outputs which can be individually wet- or dry-configured Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Embedded lock power management lowers installation costs Advanced controller-to-controller communications for cluster-based antipassback and I/O logic Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware
Add to Compare