Check out our special report on casino security
ASSA ABLOY Incedo Mobile Keys for keyless mobile entry
Technical Specification
- Make: ASSA ABLOY
- Model code: Incedo Mobile Keys
- Central / Remote Monitoring: Yes
- Import/Export of Information: Yes
- Web-enabled software: Yes
Works with range of readers and wireless locking devices, providing secure, convenient access for building users Users unlock doors and other openings with a smart device instead of traditional hard credentials like RFID cards and tokens Operates award-winning Seos® credential technology for powerful encryption, identity management and data protection Convenience: there is no need for a separate RFID credential when you open secure doors and openings with a device you already carry Flexibility: facility managers amend, issue or cancel credentials from anywhere; building users always have their access rights up to date Security: users notice a missing smart device more quickly than an RFID card or token, and on-device passwords and biometrics keep thieves out Efficiency: employees waste less time collecting or amending access credentials in person; visitors get instant temporary access when they need it Connectivity: maintain an “always-on” link between your Incedo platform and its users, enabling access permission changes in real time
Read more| Make | ASSA ABLOY |
|---|---|
| Manufacturer | ASSA ABLOY |
| Category | Access Control>Access control software |
| Model code | Incedo Mobile Keys |
| Central / Remote Monitoring | Yes |
| Import/Export of Information | Yes |
| Web-enabled software | Yes |
| Additional info |
|
More ASSA ABLOY Access control software
You might be interested in these products
Related Whitepapers
Moving to mobile: A guide for businesses switching to mobile access control
Protecting your data against physical threats
Solve access control challenges in the healthcare sector
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download
