Check out our special report on Cybersecurity
HID Fargo Print Security Manager Access control software
Technical Specification
- Make: HID
- Model code: Fargo Print Security Manager
- Visitor Management: Yes
- Time & Attendance: Yes
- Central / Remote Monitoring: Yes
Print Security Manager is a collection of up to seven applications that help you protect, efficiently manage and easily integrate your Fargo Card Identity System in a networked environment. It centralizes the management of users, devices and materials onto an Administrator workstation. So instead of running all over a building or campus to perform routine management tasks and diagnose problems, you can work more productively through Print Security Manager.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control software |
| Model code | Fargo Print Security Manager |
| Visitor Management | Yes |
| Time & Attendance | Yes |
| Central / Remote Monitoring | Yes |
| Import/Export of Information | Yes |
| Web-enabled software | Yes |
| System Requirements |
Operating System: Windows 2000, XP, Server 2003 Web Browser: Internet Explorer |
| Additional info | Print Security Manager is a collection of up to seven applications that help you protect, efficiently manage and easily integrate your Fargo Card Identity System in a networked environment. It centralizes the management of users, devices and materials onto an Administrator workstation. So instead of running all over a building or campus to perform routine management tasks and diagnose problems, you can work more productively through Print Security Manager. |
More HID Access control software
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control controllers
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
