Software House RM2-PH Access control reader
Technical Specification
- Make: Software House
- Model code: RM2-PH
- Series: RM Series
- Long Range: Yes
- Reader Type: Proximity
The RM HID Proximity reader combines the convenience and high reliability of HID ProxPro® proximity technology with the advanced electronics and stylish packaging of the RM card readers. A variety of access credentials are supported depending on your needs, including support for photo identification badges and combination technology. The RM HID Proximity Reader is available in standard and mullion styles..
Read moreMake | Software House |
---|---|
Manufacturer | Software House |
Category | Access Control>Access control readers |
Model code | RM2-PH |
Series | RM Series |
Long Range | Yes |
Reader Type | Proximity |
Standalone/ Networkable | Standalone |
Keypad Integrated | Yes |
Read Range mm | 114 mm |
LED / Beep | LED / Beep |
Electrical Specifications |
Voltage: 12 V DC Power Consumption: 250 mA |
Physical Specifications |
Dimensions mm: 129.5 x 142.2 x 49.5 Weight g: 280 |
Environmental Specifications | Operating Temp oC: -30 ~ +60 |
Protection | Weather Resistant |
Additional info |
The RM HID Proximity reader combines the convenience and high reliability of HID ProxPro® proximity technology with the advanced electronics and stylish packaging of the RM card readers. A variety of access credentials are supported depending on your needs, including support for photo identification badges and combination technology. The RM HID Proximity Reader is available in standard and mullion styles. . |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The critical importance of Trusted Execution Environment in access control
The security challenges of data centers
Access and security in the age of hybrid working
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download