Check out our special report on casino security
AMAG S880-KP proximity card reader
Technical Specification
- Make: AMAG
- Model code: S880-KP
- Reader Type: Proximity
- Keypad Integrated: Yes
- Read Range mm: 102 mm mm
AMAG Javelin S880-KP is a proximity card reader with LCD display and keypad designed for integrated access control and intrusion management. The Javelin S880-KP can operate as a standard access control reader or as a fully functional, intelligent alarm keypad with flexible intrusion alarm management capabilities. A single action of presenting a card at a reader can disarm the area behind the door (if authorized to do so) and unlock the door.
Read more| Make | AMAG |
|---|---|
| Manufacturer | AMAG Technology, Inc. |
| Category | Access Control>Access control readers |
| Model code | S880-KP |
| Reader Type | Proximity |
| Keypad Integrated | Yes |
| Read Range mm | 102 mm mm |
| LED / Beep | LED |
| Wiegand Interface | Yes |
| Electrical Specifications |
Voltage: 12 V DC Power Consumption: 250 mA |
| Physical Specifications | Dimensions mm: 113 x 153 x 30 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 49 C (32 ~ 120 F) Operating Humidity %: 15 ~ 90 |
| Additional info | AMAG Javelin S880-KP is a proximity card reader with LCD display and keypad designed for integrated access control and intrusion management. The Javelin S880-KP can operate as a standard access control reader or as a fully functional, intelligent alarm keypad with flexible intrusion alarm management capabilities. A single action of presenting a card at a reader can disarm the area behind the door (if authorized to do so) and unlock the door. |
Related Whitepapers
How analytics engines mitigate risk, ensure compliance and reduce cost
AMAG - Symmetry security management system saves energy and reduces cost
AMAG - Destination dispatch elevator integration
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

