Software House SWH-5000 Access control reader
Technical Specification
- Make: Software House
- Model code: SWH-5000
- Series: Multi-Format Series
- Reader Type: Proximity
- Standalone/ Networkable: Standalone
Reads HID, Casi Prox-Lite & Deister 125K prox. The Software House Multi-Format Proximity Readers are compatible with cards from multiple manufacturers which makes them an extremely versatile access control solution. The proximity readers combine multiple configuration options with an appealing, discreet design and economical price. Available with or without keypad, the proximity readers are ideal for numerous applications. The readers' potted electronics make them well suited for both indoor and outdoor applications.
Read moreMake | Software House |
---|---|
Manufacturer | Software House |
Category | Access Control>Access control readers |
Model code | SWH-5000 |
Series | Multi-Format Series |
Reader Type | Proximity |
Standalone/ Networkable | Standalone |
IP Rating | IP65 |
Mount Type | Mullion mount |
Read Range mm | 76 mm |
LED / Beep | LED / Beep |
Colour | Black |
Wiegand Interface | Yes |
Electrical Specifications |
Voltage: 8 ~ 16 V DC Power Consumption: 125 mA |
Physical Specifications | Dimensions mm: 120 x 45 x 25 |
Environmental Specifications |
Operating Temp oC: -35 ~ +67 Operating Humidity %: 0 ~ 100 |
Protection | IP65 |
Additional info |
Reads HID, Casi Prox-Lite & Deister 125K prox. The Software House Multi-Format Proximity Readers are compatible with cards from multiple manufacturers which makes them an extremely versatile access control solution. The proximity readers combine multiple configuration options with an appealing, discreet design and economical price. Available with or without keypad, the proximity readers are ideal for numerous applications. The readers' potted electronics make them well suited for both indoor and outdoor applications. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The critical importance of Trusted Execution Environment in access control
The security challenges of data centers
Access and security in the age of hybrid working
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download