Check out our special report on Cybersecurity
ELATEC Mobile Access Credentials - maximum flexibility for iOS and Android devices
Technical Specification
- Make: ELATEC
- Model code: Mobile Access Credentials
ELATEC supports the global mobile workforce with a family of multi-frequency contactless readers that incorporate NFC and BLE for authentication and access control using industry-leading mobile credentials. ELATEC’s mobile credential and access solutions merge security with convenience by storing secure identities on smartphones for unlocking doors, releasing print jobs, signing onto a computer network, dispensing product and more. These powerful solutions enable iOS and Android phones to communicate with readers. ELATEC mobile access and credential solutions leverage standard device technologies and are universally accessible, easy to deploy and simple to manage.
Read more| Make | ELATEC |
|---|---|
| Manufacturer | ELATEC GmbH |
| Category | Access Control>Access control software |
| Model code | Mobile Access Credentials |
| Additional info |
ELATEC supports the global mobile workforce with a family of multi-frequency contactless readers that incorporate NFC and BLE for authentication and access control using industry-leading mobile credentials. ELATEC’s mobile credential and access solutions merge security with convenience by storing secure identities on smartphones for unlocking doors, releasing print jobs, signing onto a computer network, dispensing product and more. These powerful solutions enable iOS and Android phones to communicate with readers. ELATEC mobile access and credential solutions leverage standard device technologies and are universally accessible, easy to deploy and simple to manage. |
More ELATEC Access control software
You might be interested in these products
- See other ELATEC products
- ELATEC Access control readers
Related Whitepapers
What is a universal RFID reader?
Access and security in the age of hybrid working
Cybersecurity in keyless access management
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download
