Software House SWH-5100G Access control reader
Technical Specification
- Make: Software House
- Model code: SWH-5100G
- Series: Multi-Format Series
- Long Range: Yes
- Reader Type: Proximity
Reads HID, Casi Prox-Lite & Deister 125K prox. The Software House Multi-Format Proximity Readers are compatible with cards from multiple manufacturers which makes them an extremely versatile access control solution. The proximity readers combine multiple configuration options with an appealing, discreet design and economical price. Available with or without keypad, the proximity readers are ideal for numerous applications. The readers' potted electronics make them well suited for both indoor and outdoor applications.
Read more| Make | Software House |
|---|---|
| Manufacturer | Software House |
| Category | Access Control>Access control readers |
| Model code | SWH-5100G |
| Series | Multi-Format Series |
| Long Range | Yes |
| Reader Type | Proximity |
| Standalone/ Networkable | Standalone |
| IP Rating | IP65 |
| Mount Type | Mullion mount |
| Read Range mm | 102 mm |
| LED / Beep | LED / Beep |
| Colour | Gray |
| Wiegand Interface | Yes |
| Electrical Specifications |
Voltage: 8 ~ 16 V DC Power Consumption: 125 mA |
| Physical Specifications | Dimensions mm: 111x 84 x 28 |
| Environmental Specifications |
Operating Temp oC: -35 ~ +67 Operating Humidity %: 0 ~ 100 |
| Protection | IP65 |
| Additional info |
Reads HID, Casi Prox-Lite & Deister 125K prox. The Software House Multi-Format Proximity Readers are compatible with cards from multiple manufacturers which makes them an extremely versatile access control solution. The proximity readers combine multiple configuration options with an appealing, discreet design and economical price. Available with or without keypad, the proximity readers are ideal for numerous applications. The readers' potted electronics make them well suited for both indoor and outdoor applications. |
Related Whitepapers
The critical importance of Trusted Execution Environment in access control
Open credential standards and the impact on physical access control
System design considerations to optimize physical access control
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download

