Newmark Technology PSRW26-232/1 Access control system
Technical Specification
- Make: Newmark Technology
- Model code: PSRW26-232/1
- Series: Par-Sec Series
- Operating Temperature oC: -5 ~ +40
- Voltage: 9 ~ 14
The PSRW26-232/1 reader is an RF-based device designed to monitor and protect valuable property against unauthorised movement or removal, and to track the movement of personnel. With its flexible design, Par-Sec can be integrated with new or existing access control or asset management systems that use Wiegand or RS232 data identification. It can track Portable Asset Tags, Stationary Asset Tags and monitors Personnel Tags within their programmable detection zones or portals.
Read more| Make | Newmark Technology |
|---|---|
| Manufacturer | Newmark Technology |
| Category | Access Control>Access control systems & kits |
| Model code | PSRW26-232/1 |
| Environmental Specifications | Operating Temperature oC: -5 ~ +40 |
| Electrical Specifications | Voltage: 9 ~ 14 |
| Physical Specifications | Dimensions mm: 220 x 170 x 50 |
| Accessories | Asset Management and Personnel Tracking Reader |
| Additional info | The PSRW26-232/1 reader is an RF-based device designed to monitor and protect valuable property against unauthorised movement or removal, and to track the movement of personnel. With its flexible design, Par-Sec can be integrated with new or existing access control or asset management systems that use Wiegand or RS232 data identification. It can track Portable Asset Tags, Stationary Asset Tags and monitors Personnel Tags within their programmable detection zones or portals. |
You might be interested in these products
Related Whitepapers
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
Integrated access control: reap the benefits of connected security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
