Check out our special report on casino security
AMAG 939S-KP Bluetooth access control reader with keypad
Technical Specification
- Make: AMAG
- Model code: 939S-KP
- Series: Symmetry Blue
- Long Range: Yes
- Reader Type: Proximity
Combines Bluetooth Low Energy (BLE) with conventional card reading capabilities for integrated access control Multi-tech reader (LF, HF, BLE) that provide the widest compatibility with multiple credential types Available with various comms interfaces: OSDP + Wiegand Designed to work across the whole Symmetry product range but also supports standard/open communications protocols for use with other access control systems Works with most Android or Apple smart phones Reads MIFARE, DESFire, EV1 & EV2, LEAF, 125khz proximity cards Configurable reader signal strength, can read Bluetooth BLE credentials from close-up and long range Suitable for indoor or outdoor installation Integrated door pre-held warning buzzer Light bar feedback for card accepted or rejected Optional PIN for higher security
Read more| Make | AMAG |
|---|---|
| Manufacturer | AMAG Technology, Inc. |
| Category | Access Control>Access control readers |
| Model code | 939S-KP |
| Series | Symmetry Blue |
| Long Range | Yes |
| Reader Type | Proximity |
| IP Rating | IP55 |
| Keypad Integrated | Yes |
| LED / Beep | LED / Beep |
| Wiegand Interface | Yes |
| Electrical Specifications |
Voltage: 12 V DC Power Consumption: 190 mA |
| Physical Specifications | Dimensions mm: 83 x 130 x 18 |
| Environmental Specifications | Operating Temp oC: -40 ~ 70 C (-40 ~ 158 F) |
| Protection | IP55 |
| Additional info |
|
Related Whitepapers
How analytics engines mitigate risk, ensure compliance and reduce cost
AMAG - Symmetry security management system saves energy and reduces cost
AMAG - Destination dispatch elevator integration
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

