Alarm Lock Systems AL-IR1 Mechanical digital lock
Technical Specification
- Make: Alarm Lock Systems
- Model code: AL-IR1
- Series: Trilogy Series
The battery-powered infrared printer allows your lock event log to be printed onto paper. Because it operates with an invisible infrared beam, no cord is necessary to connect it to the lock. Producing hard copies in the field or in your office could not be easier. And this improved version offers easier-to-read output and automatic shutoff for extended battery life. Simply hold the printer in front of the lock (from up to 10 inches away), and you get a neat, clean copy of your event log. You can print a complete audit trail too, or select and print only what you need from the lock.
Read more| Make | Alarm Lock Systems |
|---|---|
| Manufacturer | Alarm Lock Systems |
| Category | Access Control>Mechanical digital locks |
| Model code | AL-IR1 |
| Series | Trilogy Series |
| Additional info | The battery-powered infrared printer allows your lock event log to be printed onto paper. Because it operates with an invisible infrared beam, no cord is necessary to connect it to the lock. Producing hard copies in the field or in your office could not be easier. And this improved version offers easier-to-read output and automatic shutoff for extended battery life. Simply hold the printer in front of the lock (from up to 10 inches away), and you get a neat, clean copy of your event log. You can print a complete audit trail too, or select and print only what you need from the lock. |
- See other Alarm Lock Systems products
- Alarm Lock Systems Electronic keypads
- Alarm Lock Systems Electronic locking devices
Related Whitepapers
The critical role of access control in K-12 school security
Wireless Access Control eBook
How plate reader technology increases your perimeter security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
