NAPCO GEM-ACCESS Intruder alarm system control panel
Technical Specification
- Make: NAPCO
- Model code: GEM-ACCESS
- Accessories: Access Control Module for Gemini control panel
The Gem-Access adds integrated access control to the burglar alarm functions of the GEM-X255 Control Panel, enabling the easy creation of a fast, economical seamless system with shared database and programming. Up to 8 door of access can be added to the GEM-X255 system. Gem-Access provides controlled access to a door by releasing a mag or electric strike when a valid Prox card or Prox Keyfob is presented to an HID or GEM-PX proximity reader. The GEM-Access module is hosed in its own compact metal enclosure and includes a power supply for the unit, as well as power for the prox readers and mag locks in the system for easy, cost-effective installation.
Read more| Make | NAPCO |
|---|---|
| Manufacturer | NAPCO Security Systems Inc |
| Category | Intruder Alarms>Intruder alarm system control panels & accessories |
| Model code | GEM-ACCESS |
| Accessories | Access Control Module for Gemini control panel |
| Additional info | The Gem-Access adds integrated access control to the burglar alarm functions of the GEM-X255 Control Panel, enabling the easy creation of a fast, economical seamless system with shared database and programming. Up to 8 door of access can be added to the GEM-X255 system. Gem-Access provides controlled access to a door by releasing a mag or electric strike when a valid Prox card or Prox Keyfob is presented to an HID or GEM-PX proximity reader. The GEM-Access module is hosed in its own compact metal enclosure and includes a power supply for the unit, as well as power for the prox readers and mag locks in the system for easy, cost-effective installation. |
Related Whitepapers
Security investments retailers should consider for their 2021 budget
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
