Software House SWH-5000 Access control reader
Technical Specification
- Make: Software House
- Model code: SWH-5000
- Series: Multi-Format Series
- Reader Type: Proximity
- Standalone/ Networkable: Standalone
Reads HID, Casi Prox-Lite & Deister 125K prox. The Software House Multi-Format Proximity Readers are compatible with cards from multiple manufacturers which makes them an extremely versatile access control solution. The proximity readers combine multiple configuration options with an appealing, discreet design and economical price. Available with or without keypad, the proximity readers are ideal for numerous applications. The readers' potted electronics make them well suited for both indoor and outdoor applications.
Read more| Make | Software House |
|---|---|
| Manufacturer | Software House |
| Category | Access Control>Access control readers |
| Model code | SWH-5000 |
| Series | Multi-Format Series |
| Reader Type | Proximity |
| Standalone/ Networkable | Standalone |
| IP Rating | IP65 |
| Mount Type | Mullion mount |
| Read Range mm | 76 mm |
| LED / Beep | LED / Beep |
| Colour | Black |
| Wiegand Interface | Yes |
| Electrical Specifications |
Voltage: 8 ~ 16 V DC Power Consumption: 125 mA |
| Physical Specifications | Dimensions mm: 120 x 45 x 25 |
| Environmental Specifications |
Operating Temp oC: -35 ~ +67 Operating Humidity %: 0 ~ 100 |
| Protection | IP65 |
| Additional info |
Reads HID, Casi Prox-Lite & Deister 125K prox. The Software House Multi-Format Proximity Readers are compatible with cards from multiple manufacturers which makes them an extremely versatile access control solution. The proximity readers combine multiple configuration options with an appealing, discreet design and economical price. Available with or without keypad, the proximity readers are ideal for numerous applications. The readers' potted electronics make them well suited for both indoor and outdoor applications. |
Related Whitepapers
The critical importance of Trusted Execution Environment in access control
Open credential standards and the impact on physical access control
System design considerations to optimize physical access control
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

