Traka Laptop Lockers with optional RFID tagging
Technical Specification
- Make: Traka
- Model code: Laptop Lockers
- Reader Type: Wiegand
- Voltage: AC100-240 V
- Power Consumption: 30 W
Multiple systems can be networked together over a Local or Wide Area Network to provide accountability for a limitless number of laptops administered from multiple PC workstations running the Traka32 software. User Identification - The Traka lockers can support any type of access control device required to identify a user to the locker system. Supported devices include RFID proximity readers from all leading access control manufacturers, magstripe, barcode and biometric technologies such as fingerprint and hand, scanners.
Read moreMake | Traka |
---|---|
Manufacturer | Traka |
Category | Access Control>Access control systems & kits |
Model code | Laptop Lockers |
Reader Type | Wiegand |
Electrical Specifications |
Voltage: AC100-240 V Power Consumption: 30 W |
Physical Specifications | Dimensions mm: 500 x 500 x 1960 |
Additional info |
Multiple systems can be networked together over a Local or Wide Area Network to provide accountability for a limitless number of laptops administered from multiple PC workstations running the Traka32 software. User Identification - The Traka lockers can support any type of access control device required to identify a user to the locker system. Supported devices include RFID proximity readers from all leading access control manufacturers, magstripe, barcode and biometric technologies such as fingerprint and hand, scanners. |
Download PDF version Download PDF version |
See comparison of Traka Laptop Lockers with similar Traka Access control systems & kits
Compare Traka Laptop Lockers with Access control systems & kits from other manufacturers
You might be interested in these products
- See other Traka products
- Traka Access control software
Related Whitepapers
Simplifying key management for small to medium-sized businesses and institutions
Traka key management improves security and health & safety processes
Effective asset management in retail
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download