Access Control Cards, Tags & Fobs (540)
The Bracelet Tag will transmit a Radio Frequency (RF) signal at a preset time-interval. The Tag life is estimated at 5 years at a transmission time interval of approximately 1.5 seconds. Battery status can be inferred by interrogating the internal Tag Age Counter Value. The transmitted Tag data includes Customer Site Code (CSC), Tag ID, Tag Age Counter Value, Movement Alarm and Tamper Alarm status. For protection against adverse environmental conditions, Link-it™ Tags are encapsulated in a moulded plastic case. The L-TG1200 is generally used for hospital patient tagging, although it may be used in other applications such as personnel monitoring. The Tag can be configured to accommodate Wiegand interfacing.
Add to CompareWater and dust resistant Arm, disarm and panic functions Assigned by user for accurate reporting of open close signals LED indicator Programmable option buttons The wireless keyfob with synchronised encryption features increased immunity to replay attacks, providing even more reliable system security
Add to CompareWater and dust resistant Arm, disarm and panic functions Assigned by user for accurate reporting of open close signals LED indicator The wireless keyfob with synchronised encryption features increased immunity to replay attacks, providing even more reliable system security
Add to CompareUsed to operate CyberLock cylinders and FlashLock access points The Bluetooth 5.0 is activated with the push of a button and allows users to update access permissions on the go using an Androidor iOS app It has a convenient micro-USB port for charging on the go Cache access permissions and delay activation until the user arrives on site Fully customisable permission schedules Remotely update access permissions
Add to CompareMemory contains encrypted access codes & records up to 12,000 audit trail events Compatible with Cyber Audit-Web Basic or Enterprise (v.9.0 or later) Charge via the key tip or using the micro USB port Individually manage fully customisable permission schedules
Add to CompareUsed to operate CyberLock cylinders Expanded memory records 12,000 key events or 250 lock downloads Extends battery life and allows users to update access permissions on the go using an Android or iOS app and smartphone Powerful new features with software enhancement module, like delayed activation for locations without cellular service and Variable Temporary Access (2 minutes – 72 hours) provide ultimate control Pairs with mmart devices running the CyberAudit® Link App Individually manage fully customisable permission schedules Reports audit trails within seconds for accurate record keeping
Add to CompareThe Link-it™ KeyFOB Active Tags are powered by an internal battery. The Tag will, for the duration of its life, transmit a Radio Frequency (RF) signal at a pre-set time-interval. The Tag life is estimated at 5 years at a transmission time interval of approximately 1.5 seconds. Additionally, the KeyFOB has a panic button, and such transactions will either be logged when out of reader range, or be reported immediately when within reader range. The transmitted Tag data includes Customer Site Code (CSC), Tag ID, Tag Age Counter Value, Panic Alarm status. For protection against adverse environmental conditions, the Link-it™ KeyFOB Tag is encapsulated in a moulded plastic case. The KeyFOB Tag is generally used for key tagging, although it may be used in other applications such as personnel monitoring. The Tag can be configured to accommodate Wiegand interfacing.
Add to CompareHas an increased memory capacity with the infrared technology and replaceable battery The memory can hold up to 12,000 locks or audit events, or up to 100 lock downloads Replaceable 3 Volt Lithium CR2 battery IR communications for use with the IR Encoder 10 Individually manage fully customisable permission schedules and record audit trails
Add to CompareWorks in conjunction with CyberLock, FlashLock, and RFID access points Features dual-mode Bluetooth technology for in-the-field updates LCD screen provides a menu for viewing expirations and battery status as well as selecting key functions Android and iOS compatible communicators Memory contains encrypted access codes & records up to 12,000 audit trail events
Add to CompareUsed to operate CyberLock cylinders It has memory that contains encrypted access codes, a list of locks it may access, schedules of authorised dates and times it may access locks, and a begin-end date range during which the key will operate The battery from a CyberKey energises the electronics within a CyberLock cylinder Rechargeable battery
Add to CompareWorks in conjunction with CyberLock and FlashLock access points Has memory that contains encrypted access codes, a list of locks it may access, schedules of authorised dates and times it may access locks, and a begin-end date range during which the key will operate Records up to 12,000 audit trail events The battery from a CyberKey energises the electronics within a CyberLock cylinder The Wi-Fi capabilities of this key enable wireless updating of schedules, permissions, and access events when the key is connected to an authorised Wi-Fi network LCD screen provides a menu for viewing expirations and battery status as well as selecting key functions
Add to CompareGB/SVERIF is a Sagem Verification USB Dongle. Allows central enrolment through to support high quality enrolment and template quality check and speeds up print read times. Decreases upload time to the Sagem readers. Must be sold with both the GB/SMSO300 and GB/ISL903.
Add to CompareBacklit ICON display Built-in buzzer for audible feedback Key tactile feedback 4 one touch function keys, programmable for up to 6 functions Status button indication Wireless key keylock Active alarm indication Water resistant Multifunction clip Nominal Battery life - 3 years Compatible with ALEXOR, IMPASSA and PowerSeries (via TR5164-433)
Add to CompareSchlage multi-technology using MIFARE DESFire EV credentials are extremely flexible. Particularly useful for facilities with high security needs during a transition from magnetic stripe and proximity technology to smart technology, this card can be read by both proximity readers and smart readers. This allows customers to economically migrate to more secure MIFARE technology utilized by Schlage readers and wireless locks at their own pace.
Add to CompareA range of secure, convenient physical RFID credentials Every credential available with Incedo system has intelligence and security built-in, making it convenient for users to move around premises safely Credentials are easy to program and reprogram with Incedo-enabled updaters and readers Key-free door access through wired and wireless locks with personalised programable cards and tokens, instead of mechanical keys Seos® credential technology ensures compatibility with multiple low- and high-frequency RFID technologies — plus the latest security standards for encryption and authentication
Add to CompareThe patented Master-Token System Control, from LEGIC, has been designed to provide absolute control of an organisations security through cards, readers and smart card systems. The main feature of LEGIC Master-Token is the lack of passwords, which can travel anywhere, at any time, without detection. Companies who use a password security system are not usually aware of how easily they can be compromised. LEGIC Master-Token technology is based on a unique genetic code, contained within the contactless smart card. This, combined with the physical token, allows users to easily track the card at any time and simply withdraw applications should there be a need. Master-Token - One Card, All Applications An all-in-one card system, such as Master-Token, provides an increased security level while saving time, improving efficiency and ensuring ease for both employees and guests alike. The genetic code within this technology guarantees all the necessary credentials are unique, the code is transferred during card initialisation and to readers during configuration. LEGIC have divided the Master-Token system into distinct, separate zones. The zone information can be traced as it is passed from the Master-Token to the application and it is possible to deactivate or isolate each individual zone in the reader. With Master-Token, users are given the choice between customer defined or automatic key management and the technology uses a two-person principle. This means that while one holds the physical card, the other takes possession of the key for the applications encryption. It is also possible to control the assignment of rights for individuals.
Add to CompareThe Smarterm accepts industry standard Weigand output devices and supports virtually all card/reader technology. Proximity, Biometric, Magnetic Stripe, Barcode, Weigand, Barium Ferrite, Keypad and Smart Readers are easily connected and controlled. The Smarterm is an expandable intelligent controller capable of supporting all access control functions for 1 to 4 doors with a card read capacity of 2500 cards (expandable to 120,000 cards). It has 16 inputs, 1 tamper alarm and 9 outputs. A locking steel enclosure, power supply and battery are included. Up to 63 CIC Intelligent Controllers can be intermixed on the same communication network. Multiple communication networks can be connected to the CardAccess server for maximum system expansion. The Smarterm supports RS232 and RS422 communication formats for optimal system configuration.
Add to CompareThe XMWT1 is a proximity watch tag based on passive RFID technology, using advanced 125 kHz RF techniques. Main features: Proximity wrist tag + strap, Hands free RF-identification thus easy and comfortable to wear, surface is laser engraved with a 9 digit code, top surface can be provided with a company logo
Add to CompareSchlage proximity credentials utilizing low frequency (125 kHz) technology provide a legacy access solution for existing installs in traditional facilities and businesses. Proximity credentials provide a convenient access control solution for facilities with less demanding security needs. They are compatible with most industry-leading proximity readers, allowing them to easily integrate into existing proximity access control systems. Schlage offers a variety of credential formats to support a broad range of access control applications.
Add to CompareSchlage proximity credentials utilizing low frequency (125 kHz) technology provide a legacy access solution for existing installs in traditional facilities and businesses. Proximity credentials provide a convenient access control solution for facilities with less demanding security needs. They are compatible with most industry-leading proximity readers, allowing them to easily integrate into existing proximity access control systems. Schlage offers a variety of credential formats to support a broad range of access control applications.
Add to CompareThe BioTouch PC Card is for PC laptop users. Fully functional optical fingerprint reader inside a PC card. Comes with BioLogon Client for Windows software. Features: encryption option; CMOS camera technology from Motorola; PCMCIA interface for plug & play operation; and optical sensor.
Add to CompareMain features: ISO prox card + optional mag. stripe 2750 Oe/4000 Oe, ISO prox card can be video printed, Standard laser engraved ID number, Supplied with 9 digit Cross Point code (XC4), Also supplied with 13 digit general EM code (XC4/13), ISO prox cards can be used in combination with the XMRE3 Range Extender (up to 500 mm read range)
Add to Compare