Camden Door Controls has released its new CV-550SPK surface mount, weather and vandal resistant, backlit, stand-alone keypad with proximity card reader.

Benefits of keypad/reader

The HID format prox reader and keypad supports up to 2,000 users with card, PIN, or card and PIN access. Rugged and attractive, the keypad/reader is designed for high traffic indoor and outdoor applications.

CV-550SPK features a cast metal housing with fully potted electronics, making CV-550SPK both weather (IP 65 rated) and vandal resistant.  CV-550SPK has inputs for REX switch/sensor, door contacts, a Form ‘C’ relay, and a tamper alarm.

The unit also has a Wiegand 26 bit input and output, which allows the CV-550SPK to operate as a dual credential (prox reader and keypad) access control system device. User cards or tags can easily be individually or batch enrolled.

CV-550SPK is ideal for professional offices, healthcare, schools, retail stores as well as commercial and industrial applications. It may also be used to control entry or egress through electrically locked doors or for activating/deactivating overhead doors, automatic doors, elevators, equipment or machinery.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...