Secure interior and exterior doors using a variety of access control locks. Choose from keypad, intercom, or contact/contactless card readers.
Showing 1–10 of 13 results
-
Keep Cloud Access Control Software
Feenics is the industry’s most secure and flexible cloud-based access control solution that can be accessed anywhere using a simple user interface. Built on open architecture hardware and fortified by the security, disaster recovery, and redundancy of Amazon Web Services, Feenics is scalable from one door to global enterprise environments. It provides the ultimate choice to manage security infrastructures, integrate third-party applications and reduce capital expenditure.
-
Access Manager Software
BadgePass Access Manager offers customers a new perspective on electronic door access. Built by ID industry experts who understand the importance of streamlined card issuance and activation, this user-friendly software allows customers to not only manage door access privileges with ease, but also increase security through our automatic badge activation process. BadgePass Access Manager is more than just door access control – it is a part of our complete credential management system, allowing you to do more with your badge!
-
Two Factor Authentication
Two Factor Authentication (2FA) is becoming a powerful prevention protocol for thwarting unauthorized access, fraud, and cyberattacks. The physical security world is driving to protect sensitive information, and control staff and the public from accessing restricted areas. There is an increasing need to verify and authenticate user identity.
As security becomes more technologically advanced, so do the analytics behind addressing security needs. Two factor methods have become vital to the access control process, and will not only have to address the security concerns of the end user, they will also have to be flexible to the client’s network and current infrastructure. This white paper will explain the details of how the Blue Line Technology two-factor method works, and the practical use case scenarios that would benefit the client.
-
First Line Facial Recognition Software
First Line Software is an intelligent facial recognition, security software that provides automatic, real-time, identification verification for threat detection, access control, and concierge applications.
-
UHF Vehicle Access Control Reader
UHF Vehicle Access Controll Reader with integrated antenna, signal light and Access Controller
The ideal Stand alone-solution for vehicle identification and parking access control applications in airports, universities, gated communities and others.
-
L Series Card Readers
The Schlage L Series has long been the benchmark for mortise locks. The L Series is more than strength and security – it offers tremendous flexibility to allow it to meet the needs of most every application. Over 55 functions, 35 lever and knob designs, eight different roses and escutcheons, and a multitude of prep options are just the beginning.
-
Multi-Technology Smart Card Readers
Schlage multi-technology readers are designed to simplify access control solutions. They recognize magnetic stripe, proximity, Schlage smart card and NFC-enabled smart devices, ensuring a seamless transition to high-security smart technology in the future. They use an open architecture platform designed to work with industry standards and common access control system interfaces. The readers all fit a variety of placement needs, and include a modern design to complement any facility and its hardware.
-
AD-400 Networked Wireless Lock
AD Series locks were designed to be adaptable, allowing upgrades to be made to new technologies without taking the lock off the door. They integrate into popular electronic access control systems from Software Alliance Members to deliver a comprehensive EAC solution.
-
AD-402 FIPS 201-2 Integration-ready Wireless Electronic Lock
AD Series locks were designed to be adaptable, allowing upgrades to be made to new technologies without taking the lock off the door. They feature built-in credential reader and access control sensors for simplified installation. The AD-402 is fully PIV and PIV-I compatible for dual authentication to an external cloud-based server.
-
LE Networked Wireless Mortise Lock
AD Series locks were designed to be adaptable, allowing upgrades to be made to new technologies without taking the lock off the door. They feature built-in credential reader and access control sensors for simplified installation. The AD-402 is fully PIV and PIV-I compatible for dual authentication to an external cloud-based server.