CEM S3020 Portable handheld card reader
Technical Specification
- Make: CEM
- Model code: S3020
- Reader Type: Card Swipe
- Voltage: 2.4 V DC
- Dimensions mm: 205 x 95 x 45
The S3020 Portable Reader is a lightweight, waterproof, and rugged hand-held card reading device. It can be used for ID card validation at remote sites or temporary entrances which have no power, and can also be used as a mobile device for random checks within pre-defined zones. Upto 200,000 card ID's can be held in the reader's database for differentiation between authorised and unauthorised personnel. Up to 8,000 offline card swipe transactions can also be stored for on-line transmission to the AC2000 system via built-in 802.11g WiFi connection, (supports WPA2-AES Encryption).
Read more| Make | CEM |
|---|---|
| Manufacturer | CEM Systems Ltd |
| Category | Access Control>Access control readers |
| Model code | S3020 |
| Reader Type | Card Swipe |
| Electrical Specifications | Voltage: 2.4 V DC |
| Physical Specifications |
Dimensions mm: 205 x 95 x 45 Weight g: 550 |
| Environmental Specifications | Operating Temp oC: -30 ~ +60 |
| Protection | IP67 |
| Additional info | The S3020 Portable Reader is a lightweight, waterproof, and rugged hand-held card reading device. It can be used for ID card validation at remote sites or temporary entrances which have no power, and can also be used as a mobile device for random checks within pre-defined zones. Upto 200,000 card ID's can be held in the reader's database for differentiation between authorised and unauthorised personnel. Up to 8,000 offline card swipe transactions can also be stored for on-line transmission to the AC2000 system via built-in 802.11g WiFi connection, (supports WPA2-AES Encryption). |
Related Whitepapers
Access and security in the age of hybrid working
Integrated access control: reap the benefits of connected security
Three essential reasons to upgrade your access control technology in 2022
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

