Check out our special report on Artificial Intelligence
Kantech EntraPass Corporate Edition Access control software
Technical Specification
- Make: Kantech
- Model code: EntraPass Corporate Edition
- Max No. of Doors per System: 17,408
- No of concurrent PC Operators: 20 operators
- Communication: TCP/IP
Supports more than 100,000 readers. Advanced system integration can be accomplished by using the bi-directional SmartLink to communicate with software applications such as Time and Attendance systems, Badging systems, Human Resource Management systems, Student Registration systems, etc., through TCP/IP, an RS-232 port or with DLLs. This allows complete and real-time data exchanges between systems, eliminating redundant data entry.
Read more| Make | Kantech |
|---|---|
| Manufacturer | Kantech |
| Category | Access Control>Access control software |
| Model code | EntraPass Corporate Edition |
| Max No. of Doors per System | 17,408 |
| No of concurrent PC Operators | 20 operators |
| Communication | TCP/IP |
| Time & Attendance | Yes |
| Elevator Control | Yes |
| Central / Remote Monitoring | Yes |
| System Requirements | Operating System: Windows 98/XP/NT/2000/2003 |
| Additional info | Supports more than 100,000 readers. Advanced system integration can be accomplished by using the bi-directional SmartLink to communicate with software applications such as Time and Attendance systems, Badging systems, Human Resource Management systems, Student Registration systems, etc., through TCP/IP, an RS-232 port or with DLLs. This allows complete and real-time data exchanges between systems, eliminating redundant data entry. |
You might be interested in these products
Related Whitepapers
12 questions to ask your access control provider
Access and security in the age of hybrid working
Cybersecurity in keyless access management
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

