Check out our special report on Cybersecurity
HID OMNIKEY 5125 Access control reader
Technical Specification
- Make: HID
- Model code: OMNIKEY 5125
- Series: OMNIKEY Series
- Reader Type: Proximity
- Standalone/ Networkable: Networkable
Robust housing and long USB cable for increased convenience and reliability. Supports a variety of PC/SC drivers for contact interface. Equipped with an interchangeable standing base for both vertical and horizontalconfigurations and easily mounts to any PC monitor. Supports ISO 7816 and EMV (Europay®, MasterCard, Visa), Microsoft WHQL, and HBCI (Home Banking Computer Interface) industry standards for contact cards.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control readers |
| Model code | OMNIKEY 5125 |
| Reader Type | Proximity |
| Standalone/ Networkable | Networkable |
| LED / Beep | LED |
| Colour | Grey |
| Electrical Specifications | Power Consumption: 60 mA |
| Physical Specifications |
Dimensions mm: 80 x 67 x 28 Weight g: 110 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 55 Operating Humidity %: 10 ~ 90 |
| Additional info |
Robust housing and long USB cable for increased convenience and reliability. Supports a variety of PC/SC drivers for contact interface. Equipped with an interchangeable standing base for both vertical and horizontal configurations and easily mounts to any PC monitor. Supports ISO 7816 and EMV (Europay®, MasterCard, Visa), Microsoft WHQL, and HBCI (Home Banking Computer Interface) industry standards for contact cards. |
- See other HID products
- HID Access control cards/ tags/ fobs
- HID Access control controllers
- HID Access control software
Related Whitepapers
Three essential reasons to upgrade your access control technology in 2022
Physical access control in higher education
OSDP is the strongest access control for your business
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

