6767

Proxy Card Reader to Control Building Access

Building Access System Proxy Reader
Eliminate the chance of forgottetn keys/codes by using a proxy card reader for building access.

A proximity card reader is available for use with the Building Access System. This eliminates the chance of a forgotten code and increases your level of access control. An employee can easily share a keycode with others, but not a proxy card. In the event that a card is lost or stolen, it can be deactivated in seconds and a new card can be issued in its place.


The Building Access System proxy reader allows users to gain access the building by swiping a proxy card.



Proxy Card Reader
Dimensions: 4.7"L x 3"W x 0.68"D
Mounting: Wall mount
Operating Temperature: -22 to 150 degrees F (-30 to 65 degrees C)
Operating Humidity: 0%-95% non-condensing

The Building Access Control System gives network alarm managers the ability to control and regulate door entry access. With a built in fault tolerance system this security management system can effectively control your sites. You will have complete visibility of all your sites simultaneously, as well as have some record of who was in your building. This provides valuable security to your remote sites and deters theft, break-ins and vandalism. These are unfortunate realities for remote sites and you cannot afford to leave your site vulnerable. Protect your site and your gear with a Building Access Control System.


Get a Custom Application Diagram of Your Perfect-Fit Monitoring System

There is no other network on the planet that is exactly like yours. For that reason, you need to build a monitoring system that's the right fit for you.

"Buying more than you need" and "buying less than you need" are real risks. You also have to think about training, tech support, and upgrade availability.

Send me a quick online message about what you're trying to accomplish. I'll work with you to build a custom PDF application diagram that's a perfect fit for your network.


Make an Informed Decision


Your network isn't off-the-shelf.

Your monitoring system shouldn't be, either.

Customized monitoring application drawing

We'll walk you through this with a customized monitoring diagram.

Just tell us what you're trying to accomplish with remote monitoring.

Get a Custom Diagram