Nortech Control Systems Ltd are pleased to announce their recent acquisition of proximity reader manufacturer JTI Technologies Ltd.

JTI Technologies Ltd was established in 1998 and designed the ‘DualPROX™' family of readers.  The DualPROX™ family of readers offers the choice of flexibility and cost effectiveness whether it is for a new access control system, expansion of an existing system or simply replacement readers.

The DualPROX™ readers read both old PAC (153.6kHz) and new (125kHz) cards and tokens.  The readers can output card numbers in a choice of formats including 26-bit Wiegand, 44-bit Wiegand and PAC Technology serial data.

DualPROX™ allows installers and system integrators to easily integrate with many different types of host system controllers for which they only need to stock one type of reader regardless of the system it is intended to be used with.

Nortech aim to provide an ex-stock service on the entire DualPROX™ family.  Managing Director Stephen Blackler comments, "Our recent acquisition of JTI is an exciting development for Nortech. The readers join our growing portfolio of access control products.  As always, we will endeavour to provide excellent levels of stock and unparalleled customer service."

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...