Verex G-Prox II Proximity Cards Access control card/ tag/ fob
Technical Specification
- Make: Verex
- Model code: G-Prox II Proximity Cards
- Operating Temperature oC: -45 ~ +70
- Accessories: Proximity Cards
The G-Prox™ II proximity access cards permit convenient contact-less operation without the wear of a physical contact card. They are available blank (un-programmed) or in either industry standard 26 bit format or the VEREX exclusive 36 bit format. All G-Prox™ II cards and keychain tokens are fully compatible with all of the G-Prox™ II proximity reader line. User Programmable. The optional secure Lock Codes enable the installer to lock cards and readers to a specific and unique code providing enhanced security and anti-takeover features. Avaliable as G-ProxCard, G-ProxPhoto, G-ProxTwin and G-ProxKey access control proximity cards compatible with G-Prox II readers.
Read moreMake | Verex |
---|---|
Manufacturer | VEREX Technology |
Category | Access Control>Access control cards/ tags/ fobs |
Model code | G-Prox II Proximity Cards |
Environmental Specifications | Operating Temperature oC: -45 ~ +70 |
Accessories | Proximity Cards |
Additional info | The G-Prox™ II proximity access cards permit convenient contact-less operation without the wear of a physical contact card. They are available blank (un-programmed) or in either industry standard 26 bit format or the VEREX exclusive 36 bit format. All G-Prox™ II cards and keychain tokens are fully compatible with all of the G-Prox™ II proximity reader line. User Programmable. The optional secure Lock Codes enable the installer to lock cards and readers to a specific and unique code providing enhanced security and anti-takeover features. Avaliable as G-ProxCard, G-ProxPhoto, G-ProxTwin and G-ProxKey access control proximity cards compatible with G-Prox II readers. |
Download PDF version Download PDF version |
Related Whitepapers
Integrated access control: reap the benefits of connected security
A guide to specifying RFID readers
Three essential reasons to upgrade your access control technology in 2022
Cybersecurity for enterprise: The essential guide to protecting your business
Download5 surprising findings from OT vulnerability assessments
DownloadThe 2024 state of physical access trend report
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
Download