Cardkey Pegasys 900 Access control system
Technical Specification

- Make: Cardkey
- Model code: Pegasys 900
- Series: Pegasys Series
- Standalone/ Networked/ PC: PC-based
The Pegasys 900 comes with proximity readers, windows operating system, logic based controllers, magstripe readers with optional keypads, camera, badger printer and proximity cards. System features 8000 transactions per controller, 128 readers max, and fingerprint reader capability at host computer. The PC requires an optional LAN module for network operations. A PCI board (model P1K-ECARD900C), when installed provides full LAN peer to peer system management. The optional board P900VI can be used for video imaging. For large applications, the P900-MPE-4 board can be used.
Read moreMake | Cardkey |
---|---|
Manufacturer | Cardkey |
Category | Access Control>Access control systems & kits |
Model code | Pegasys 900 |
Series | Pegasys Series |
Standalone/ Networked/ PC | PC-based |
Additional info | The Pegasys 900 comes with proximity readers, windows operating system, logic based controllers, magstripe readers with optional keypads, camera, badger printer and proximity cards. System features 8000 transactions per controller, 128 readers max, and fingerprint reader capability at host computer. The PC requires an optional LAN module for network operations. A PCI board (model P1K-ECARD900C), when installed provides full LAN peer to peer system management. The optional board P900VI can be used for video imaging. For large applications, the P900-MPE-4 board can be used. |
Download PDF version Download PDF version |
You might be interested in these products
- See other Cardkey products
- Cardkey Access control controllers
- Cardkey Access control software
Related Whitepapers
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
Integrated access control: reap the benefits of connected security
7 proven solutions for law enforcement key control and asset management
Download2025 Trends in video surveillance
DownloadMaximising security and performance
DownloadGuide for HAAS: New choice of SMB security system
DownloadThe truth behind 9 mobile access myths
Download