Check out our special report on Cybersecurity
HID Omnikey 5427 CK contactless reader with CCID and keyboard wedge interface
Technical Specification
- Make: HID
- Model code: Omnikey 5427 CK
- Series: OMNIKEY Series
- Reader Type: Smart Card
- IP Rating: 54
HID Global's OMNIKEY® 5427CK reader combines a modern design with a small footprint and functions in virtually any PC environment, opening new market opportunities for system integrators. Independent of operating system, the reader includes CCID and keyboard wedge interface and it is commonly used for secure print authentication applications and access control systems as well as PC login using existing employees' credentials.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control readers |
| Model code | Omnikey 5427 CK |
| Reader Type | Smart Card |
| IP Rating | 54 |
| Colour | Black/Grey |
| Physical Specifications |
Dimensions mm: 71 x 93 x 16 Weight g: 100 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 70 C (32 ~158 F) Operating Humidity %: 10 ~ 90 |
| Additional info |
HID Global's OMNIKEY® 5427CK reader combines a modern design with a small footprint and functions in virtually any PC environment, opening new market opportunities for system integrators. Independent of operating system, the reader includes CCID and keyboard wedge interface and it is commonly used for secure print authentication applications and access control systems as well as PC login using existing employees' credentials. |
- See other HID products
- HID Access control cards/ tags/ fobs
- HID Access control controllers
- HID Access control software
Related Whitepapers
Three essential reasons to upgrade your access control technology in 2022
Physical access control in higher education
OSDP is the strongest access control for your business
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

