- Home
- Products
- Access Control
- Access control systems & kits
- PAC KeyPac Shadow Solo
KeyPAC <EM>Shadow</EM> Solo stand-alone proximity reader / controller
Product Profile
The KeyPAC Shadow Solo offers a significant improvement to its predecessor, the KeyPAC Solo. The new Shadow version is a fully voidable system – i.e. the ability to deactivate specific lost or stolen ID devices without the need to deactivate and re-issue all the cards within the system. Standard features include:
Read more
- Up to 2,000 users
- Supplied with 10 ID devices, 10 Shadow cards and 2 master cards
- Available in Standard, Universal and Vandal Resistant versions
- Five year guarantee
Technical Specification
Make | PAC |
---|---|
Manufacturer | PAC International, Ltd |
Category | Access Control>Access control systems & kits |
Model code | KeyPac Shadow Solo |
Series | keyPAC SOLO Series |
Standalone/ Networked/ PC | Standalone |
Reader Type | Proximity |
Max Doors per Controller | 1 doors/controller |
c/w Cards, Tags or Fobs | Cards |
Long Range | Yes |
No/ Type of Inputs/ Outputs | alarm output |
Electrical Specifications | Voltage: 30 |
Physical Specifications | Dimensions mm: 86 x 86 x 15 |
Additional info | Stand-alone reader / controller. Each unit comes with a card wallet which contains 10 KeyPAC proximity ID devices (cards or tokens), 2 master cards (for programming) and 10 Shadow cards (for the deletion of lost or stolen ID devices). Tamper protected. |
Download PDF version Download PDF version |
Contact PAC International, Ltd
More PAC Access control systems & kits
See comparison of PAC KeyPac Shadow Solo with similar PAC Access control systems & kits


Compare PAC KeyPac Shadow Solo with Access control systems & kits from other manufacturers
You might be interested in these products


Featured white papers

Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
DownloadQuick poll
Which trend do you think will define physical security in the next 5 years?