Access control systems & kits (996)
Nearly all access systems need a mains power outlet at the door. Fitting a mains spur for a new build can cost from £60, while retrofits can often cost more than £300. Most access control systems require cabinets to house power supplies and electronic circuit boards. These are often mounted above the door or in the ceiling void.Borer's new FUSION Access Control installation needs less hardware. A typical installation consists of a Borer smartcard reader, lock manager and electric lock all fitted at door handle height. The credit-card sized lock manager is mounted inside the Push-To-Exit switch or surface mounting, and is used to perform multiple functions including managing the power to the strike and monitor door status settings.FUSION needs less equipment to be installed and has fewer cables to terminate. You don't need mains power outlets at every door so you don't need a qualified electrician. As all equipment is mounted at door handle height, it can be safety installed without using ladders thereby eliminating the dangers and paperwork associated with working at heights.Many access control systems use traditional cable architecture to connect a chain of access doors to a PC or the LAN via an RS485 to Ethernet converted. The data cable is run from door to door in a daisy chain style. In contrast, FUSION uses standard CAT5e network cable. Each door has its own cable connection to a network bridge. More cable is needed, but CAT5e cable costs a third of the price of RS485 cable.Up to 80% of service calls are often resolved by simple power resetting equipment. FUSION has remote diagnostic and repair facilities built into the access control system. This enables many service tasks to be undertaken via remote control over the internet, using a secure connection. This can significantly impact on service overheads.FUSION supports power and data delivery over CAT5e network cable. This allows the system administrator or service provider to monitor, manage and control door access readers, attendance terminals and security input panels. In this way many basic faults can be resolved without having to call out a service engineer.FUSION can also significantly impact on your energy costs. Borer's door installation consisting of an electric strike and combined smartcard reader/controller using Power over Ethernet technology consumes only 3 watts, costing between £3 and £5 per annum for energy.
Add to CompareThe IP based SMAX Access Control Management System From BQT is a sophisticated, intelligent and cost-effective security system, which manages the movement of staff and visitors within a building complex. SmaX can be managed and administered by any authorized individual, from any PC that has access to the network. The system is WEB browser based which means that the database and configuration remains within the SmaX hardware, offering a high level of data security and not requiring a dedicated PC. Individuals with the correct administration levels can manage remote sites from any location - obtaining reports, authorizing cards and changing access criteria, providing an ideal solution for multi site installations. Designed with the user in mind, setup and configuration are fast and the system is easy to manage - it's completely scalable and can be expanded as your needs grow. The SmaX management software enables the enrolment of Biometric and Mifare card Data at the click of a button, with the option of associating the cardholder photograph at the same time. The SmaX system has a single intelligent module to make the decisions at the door. Access permissions and transactions are carried out in these devices, which report directly to the main system in real time. If the Network fails at any point, these devices ensure system continuity without comprising security. Smax reduces the cost and stress involved in the management of staff and building security. New European website has been launched. To visit, click here.
Add to CompareA key cabinet designed to program and dispense up to 20 keys The keys are stored in the secured vault in an unprogrammed state until an approved PIN and/or RFID card is presented After the presentation of an approved PIN and/or RFID card the vault programs a key with that user’s access permissions and releases the door latch Reads the ID of most unencrypted 13.56 MHz RFID cards and recharges keys while in the vault The front of the vault contains an RFID reader with an indicator light and keypad, as well as an LCD touchscreen Can be scalable, meaning numerous vaults can communicate within a single CyberAudit Enterprise system Designed and developed to meet security needs of medium to large scale facilities
Add to CompareThe EZ-32 Series are complete access control systems designed for fast and easy installation. All required components (software, controller, readers, UPS, backup battery and enclosure plus 2 test cards) are included in the package. The installer need only provide electrical locking devices and cabling to complete the installation. Compact 16 x 18 x 5 enclosure fits all components. 30,000 cardholders with 1MB of RAM. 1 auxiliary alarm input & 1 relay output per reader.
Add to CompareThe Reader interface to the personal computer via a standard USB cable (incorporated into the reader). One of the features of this reader is that it operates on a plug and play basis due to the USB standard it complies to. The reader works in conjunction with the Wavetrend Active RFID Tags. The enclosure was designed in such a way that it enhances the esthetical value of that individual’s desk. The user is able to select only one tag via software and monitor that specific tag, or monitor a few tags, which was selected by the user at installation.
Add to CompareThe EZ-Eight Series are complete access control systems designed for fast and easy installation. All required components (software, controller, readers, reader interfaces, UPS, backup battery, enclosure and 2 test cards) are included. The installer only needs to provide electrical locking devices and cabling to complete the installation. Compact 16 x 18 x 5 enclosure fits all components. 30,000 users with 1MB of RAM (included). 8 auxiliary alarm inputs & 8 relay outputs.
Add to CompareWAVETREND’s unique logical PC access control system which provides personalised access for users authorised to use a particular computer. The Active Identification Tag transmits a unique code at constant intervals. The reader (plugged into the serial or USB port of the computer) then reports the presence of all tags in the environment to the control computer. Because each Tag has a unique code, the software can be configured to recognise specific codes. While the unique code is being read from an authorised tag, access to the computer is available. As soon as that unique tag is not present, the access control screensaver activates, hiding the information on the screen and restricting unauthorised access.
Add to CompareAs the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to CompareThe Monitor XL Elevator Control Package provides powerful flooraccess Each package consists of three components. The Elevator Control Module is the main controller used to control the readers and send relay commands to the various relay modules.control supporting both Wiegand and magnetic stripe card technologies with a maximum of 64,000 cardholders.
Add to CompareAs the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to CompareAs the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to CompareAs the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to CompareOffers a significant increase to key update speed when paired with a CyberKey Authoriser Hub 2 and is fully compatible with all CyberKeys Serves as the interface between CyberLock hardware and CyberAudit management software Indoor/outdoor installation
Add to CompareThe 16-zone expander board provides an additional 16 zones inputs for the universal expander, along with extra detector power supply connections to simplify device wiring. The board is installed within the universal expander enclosure and connection is made via the ribbon cable supplied. All communications and power requirements for the board are provided by the host Universal Expander module. Other properties include detector power output required, no additional enclosure required and provides a cost effective zone expansion option.
Add to CompareThe universal expander module connects to an Inner Range system to provide an additional 16 zone inputs, 8 auxiliary outputs and 2 siren drivers. Up to 64 expander modules can be installed in an IR 3000 or IR Access 4000 system, depending on the memory option fitted to the control module. The optional lift interface board enables extensive control and monitoring of lift car operation and floor access. Other features are on-board diagnostic LED’s; fuse protection of LAN/detector/siren outputs/battery circuit, and system inputs monitor power supply, fuse and battery status.
Add to CompareAs the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to CompareAs the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to CompareAs the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to CompareProvides 230 VAC power for 2 locks, ScramblePads, ScrambleProx & MATCH. 16Amps inrush & 300mA holding current per lock. 2 heavy-duty relays (1 powered, 1 dry) per lock. Includes lockable enclosure, transformer, & batteries.
Add to CompareA two-key vault that stores, secures, and programs up to two CyberKey smart keys Simply input a PIN and/or scan an RFID card The vault will program a key based on the credentials presented and the vault door will unlock It is also scalable, which means multiple vaults can communicate within a larger CyberAudit® Enterprise system
Add to CompareThe Lenel Biometric Reader Interface Gateway (BRI) is an extremely versatile and vital link between the Lenel LNL-2000 Intelligent System Controller (ISC) and biometric readers from multiple manufacturers. Using OnGuard Access, the gateway can be uniquely configured to support Recognition Systems hand geometry readers, Identix fingerprint readers or Bioscrypt fingeprint readers.
Add to CompareManages the information of up to 65,000 cardholder (upto 40 different access profiles) and more than 10,000 events. Access cards and profiles, schedules and events are stored internally. No single point of failure - in case of a network failure the controllers remain operational and continue to save the events internally. Remote management and secured access to the axesplus service platform via the Internet.
Add to CompareCEM Systems DIU/700/231 offers a complete IP based access control solution that eradicates the need to provide local mains power at the door. The unit installation is classed as low voltage and can be completed by IT network installers without the expense of an electrician or electrical contractor.
Add to CompareAs the foundation of the Monitor XL™ security system, the Monitor XL Control Panel holds the entire user database and all system information and operates independently in non-volatile memory. The base Prime model supports 1,000 users, while the base Enterprise model supports 4,000 users, or up to 64,000 with additional memory.
Add to Compare