Check out our special report on casino security
AMAG Javelin S870-EX-KP proximity card reader
Technical Specification
- Make: AMAG
- Model code: Javelin S870-EX-KP
- Reader Type: Proximity
- Keypad Integrated: Yes
- Read Range mm: 102 mm
AMAG Javelin S870-EX-KP is a proximity card reader with keypad designed for extreme weather conditions and environments for integrated access control. The Javelin S870-EX-KP is designed for use with the Symmetry multiNODE range of controllers and is compatible with all versions of Symmetry software. Both the card reader and cable are supervised, and an alarm will be generated if the card reader is tampered with or communications lost.
Read more| Make | AMAG |
|---|---|
| Manufacturer | AMAG Technology, Inc. |
| Category | Access Control>Access control readers |
| Model code | Javelin S870-EX-KP |
| Reader Type | Proximity |
| Keypad Integrated | Yes |
| Read Range mm | 102 mm |
| LED / Beep | LED |
| Wiegand Interface | Yes |
| Electrical Specifications |
Voltage: 12 V DC Power Consumption: 120 mA |
| Physical Specifications | Dimensions mm: 85 x 113 x 23 |
| Environmental Specifications |
Operating Temp oC: -25 ~ +70 C (-13 ~ +158 F) Operating Humidity %: 15 ~ 90 |
| Additional info | AMAG Javelin S870-EX-KP is a proximity card reader with keypad designed for extreme weather conditions and environments for integrated access control. The Javelin S870-EX-KP is designed for use with the Symmetry multiNODE range of controllers and is compatible with all versions of Symmetry software. Both the card reader and cable are supervised, and an alarm will be generated if the card reader is tampered with or communications lost. |
Related Whitepapers
How analytics engines mitigate risk, ensure compliance and reduce cost
AMAG - Symmetry security management system saves energy and reduces cost
AMAG - Destination dispatch elevator integration
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

