NAPCO GEM-ACCESS Intruder alarm system control panel
Technical Specification
- Make: NAPCO
- Model code: GEM-ACCESS
- Accessories: Access Control Module for Gemini control panel
The Gem-Access adds integrated access control to the burglar alarm functions of the GEM-X255 Control Panel, enabling the easy creation of a fast, economical seamless system with shared database and programming. Up to 8 door of access can be added to the GEM-X255 system. Gem-Access provides controlled access to a door by releasing a mag or electric strike when a valid Prox card or Prox Keyfob is presented to an HID or GEM-PX proximity reader. The GEM-Access module is hosed in its own compact metal enclosure and includes a power supply for the unit, as well as power for the prox readers and mag locks in the system for easy, cost-effective installation.
Read moreMake | NAPCO |
---|---|
Manufacturer | NAPCO Security Systems Inc |
Category | Intruder Alarms>Intruder alarm system control panels & accessories |
Model code | GEM-ACCESS |
Accessories | Access Control Module for Gemini control panel |
Additional info | The Gem-Access adds integrated access control to the burglar alarm functions of the GEM-X255 Control Panel, enabling the easy creation of a fast, economical seamless system with shared database and programming. Up to 8 door of access can be added to the GEM-X255 system. Gem-Access provides controlled access to a door by releasing a mag or electric strike when a valid Prox card or Prox Keyfob is presented to an HID or GEM-PX proximity reader. The GEM-Access module is hosed in its own compact metal enclosure and includes a power supply for the unit, as well as power for the prox readers and mag locks in the system for easy, cost-effective installation. |
Download PDF version Download PDF version |
You might be interested in these products
- See other NAPCO products
- NAPCO Intruder detectors
- NAPCO Intruder alarm communicators
Related Whitepapers
Security investments retailers should consider for their 2021 budget
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download