Check out our special report on Cybersecurity
HID 3350 iCLASS SE Clamshell Smart Card contactless smart card
Technical Specification
- Make: HID
- Model code: 3350 iCLASS SE Clamshell Smart Card
- Series: iCLASS Series
- Card/ Tag/ Fob: Card
- Technology Type: Smart Card
Ideal for ICLASS SE installations in harsh environments and can be used for a range of diverse applications. iCLASS SIO-Enabled (iCLASS SE) Clamshell smart cards are part of HID Global's next generation access control platform and open ecosystem based on Secure Identity Object™ (SIO), a new portable credential methodology, and HID Global's Trusted Identity Platform™ (TIP) architecture for advanced applications, mobility and heightened security.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | 3350 iCLASS SE Clamshell Smart Card |
| Card/ Tag/ Fob | Card |
| Technology Type | Smart Card |
| Memory Size KB | 2 |
| Physical Specifications |
Dimensions mm: 54 x 86 x 2 Weight g: 6.8 |
| Environmental Specifications |
Operating Temp oC: -40 ~ 70 Operating Humidity %: 5 ~ 95 |
| Additional info |
Ideal for ICLASS SE installations in harsh environments and can be used for a range of diverse applications. iCLASS SIO-Enabled (iCLASS SE) Clamshell smart cards are part of HID Global's next generation access control platform and open ecosystem based on Secure Identity Object™ (SIO), a new portable credential methodology, and HID Global's Trusted Identity Platform™ (TIP) architecture for advanced applications, mobility and heightened security. |
- See other HID products
- HID Access control readers
- HID Access control controllers
- HID Access control software
Related Whitepapers
A brief history of access control credentials
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

