Check out our special report on Cybersecurity
HID Prox80
Technical Specification
- Make: HID
- Model code: Prox80 5405/5408
- Series: Prox Series
- Reader Type: Proximity
- Standalone/ Networkable: Standalone
HID's Prox80 reader is an 80 mm (3.15") square reader designed to mount directly to European and Asian size single-gang electrical back boxes. With a three-piece, weatherproof potted enclosure and long pigtail (2.7 m / 9 ft) design, the Prox80 is easily installed and provides up to 14 cm (5.5") of read range.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control readers |
| Model code | Prox80 5405/5408 |
| Reader Type | Proximity |
| Standalone/ Networkable | Standalone |
| Mount Type | Surface mount |
| Read Range mm | 30.7 ~ 140 mm |
| LED / Beep | LED / Beep |
| Colour | Gray / white |
| Wiegand Interface | Yes |
| Clock-and-Data Interface | Yes |
| Electrical Specifications |
Voltage: 5 ~ 16 V DC Power Consumption: 115 mA |
| Physical Specifications |
Dimensions mm: 80 x 80 x 20 Weight g: 63 |
| Environmental Specifications |
Operating Temp oC: -30 ~ +65 Operating Humidity %: 0 ~ 95 |
| Protection | Weather resistant |
| Additional info |
HID's Prox80 reader is an 80 mm (3.15") square reader designed to mount directly to European and Asian size single-gang electrical back boxes. With a three-piece, weatherproof potted enclosure and long pigtail (2.7 m / 9 ft) design, the Prox80 is easily installed and provides up to 14 cm (5.5") of read range. |
- See other HID products
- HID Access control cards/ tags/ fobs
- HID Access control controllers
- HID Access control software
Related Whitepapers
Three essential reasons to upgrade your access control technology in 2022
Physical access control in higher education
OSDP is the strongest access control for your business
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

