SOLO - STAND-ALONE PROXIMITY ACCESS
Designed for small stand-alone access control applications where security, cost and simplicity are important.
This exceptionally affordable device relies on a valid tag or access card being presented before access is granted. The SOLO can cater for 50 user tags (ZAPtags) with the ability to selectively add and delete users. It supports a single channel output with latch or non-latch functionality and the option to provide a secure link with the access point device via a “SmartSwitch”.
SOLO offers other useful features such as door monitoring with alarm activation which will sound after a predetermined period if the door has been forced or simply left open.
LATTICE - NETWORKED PROXIMITY ACCESS CONTROL
The Lattice proximity (RFID) access control system offers a really affordable and secure solution for tracking, controlling and monitoring the movement of staff and/or visitors in and out of premises.
It offers seamless expansion from a standalone 1000 tag reader (ZAPtags), all the way up to a fully fledged 32 reader network system with a sophisticated PC interface delivering advanced management and reporting capabilities.
By combining two readers, both directions of traffic flow can be controlled through up to 16 doors. Up to seven levels of anti-pass back can also be set up for each individual tag.
Each access control reader provides a potential-free output or secure link via the optional “SmartSwitch” interface module to activate either a door lock, gate motor, traffic barrier etc.
The “door sense” input on each reader will monitor whether the door has been left open or even forced, activating a local buzzer or triggering an third party alarm.
The readers are weatherproof with surface and flush-mount options.
LatticeWare - MANAGEMENT SOFTWARE FOR THE LATTICE ACCESS CONTROL SYSTEM
The system, whether a stand-alone reader or network, can be further enhanced by adding a PC with LatticeWare software. This software allows easy and intuitive management of the Lattice access control system. It is able to generate multiple access control reports, adds the ability of setting up of various timed functions in the system including: