Check out our special report on casino security
Traka Laptop Lockers with optional RFID tagging
Technical Specification
- Make: Traka
- Model code: Laptop Lockers
- Reader Type: Wiegand
- Voltage: AC100-240 V
- Power Consumption: 30 W
Multiple systems can be networked together over a Local or Wide Area Network to provide accountability for a limitless number of laptops administered from multiple PC workstations running the Traka32 software. User Identification - The Traka lockers can support any type of access control device required to identify a user to the locker system. Supported devices include RFID proximity readers from all leading access control manufacturers, magstripe, barcode and biometric technologies such as fingerprint and hand, scanners.
Read more| Make | Traka |
|---|---|
| Manufacturer | Traka |
| Category | Access Control>Access control systems & kits |
| Model code | Laptop Lockers |
| Reader Type | Wiegand |
| Electrical Specifications |
Voltage: AC100-240 V Power Consumption: 30 W |
| Physical Specifications | Dimensions mm: 500 x 500 x 1960 |
| Additional info |
Multiple systems can be networked together over a Local or Wide Area Network to provide accountability for a limitless number of laptops administered from multiple PC workstations running the Traka32 software. User Identification - The Traka lockers can support any type of access control device required to identify a user to the locker system. Supported devices include RFID proximity readers from all leading access control manufacturers, magstripe, barcode and biometric technologies such as fingerprint and hand, scanners. |
See comparison of Traka Laptop Lockers with similar Traka Access control systems & kits
Compare Traka Laptop Lockers with Access control systems & kits from other manufacturers
You might be interested in these products
- See other Traka products
- Traka Access control software
Related Whitepapers
Simplifying key management for small to medium-sized businesses and institutions
Traka key management improves security and health & safety processes
Effective asset management in retail
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

