Download PDF version Contact company

Idesco's user-friendly DESCoder software application not only encodes Mifare® and DESFire transponders but enables you to customise your Access 8 CD readers with specially formatted configuration cards. Programming reader settings has never been so fast and simple. You can change all configurable parameters of your 8 CD readers, e.g. security keys and bit lengths, simply by exposing them to a programmed configuration card DESCoder creates for you - without uninstalling or disconnecting your readers from the system!

With DESCoder, you are free to change configurations or make updates in your 8 CD readers whenever and as often as you like. You can quickly upgrade them to a higher security level or even, in some cases, to an entirely new reader technology. You define and create your own security level in addition to numerous other security and convenience features but equally important, you are now free to maintain and change them whenever you choose.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?