Check out our special report on casino security
Honeywell Security Vindicator® V3 ACS access control system
Technical Specification
- Make: Honeywell Security
- Model code: Vindicator® V3 ACS
- Standalone/ Networked/ PC: Standalone
- Reader Type: Biometric
- c/w Cards, Tags or Fobs: Cards
A self-contained access control system that does not require a PC or Windows software to operate The system consists of any number of V3 ACS servers, readers, and door hardware and other I/O Each V3 ACS controller houses the necessary credential database to administer complex access routines for predefined regions of a facility by interfacing with its associated credential readers and access control hardware The system supports configurations for card, card + PIN, PIN-only, and card + PIN + biometric access for flexible user identification
Read more| Make | Honeywell Security |
|---|---|
| Manufacturer | Honeywell |
| Category | Access Control>Access control systems & kits |
| Model code | Vindicator® V3 ACS |
| Standalone/ Networked/ PC | Standalone |
| Reader Type | Biometric |
| c/w Cards, Tags or Fobs | Cards |
| No of Cardholders | > 30,000 |
| No/ Type of Inputs/ Outputs | 8 sensor inputs / 4 relay outputs |
| Environmental Specifications |
Operating Temperature oC: -30 ~ 70 C (-22 ~ 158 F) Operating Humidity %: 5 ~ 95 |
| Electrical Specifications | Voltage: 10 ~ 24 V DC |
| Physical Specifications |
Dimensions mm: 267 x 191 x 25 Weight g: 907 |
| Additional info |
|
Compare Honeywell Security Vindicator® V3 ACS with Access control systems & kits from other manufacturers
You might be interested in these products
Related Whitepapers
Nine ways to make your retail security system work harder
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

