Check Out Our Special Report On Casino Security
HID IPB6 Platform RFID Reader
Technical Specification
- Make: HID
- Model code: iPB6 Platform
- Reader Type: RFID
- Standalone/ Networkable: Standalone
Part of the powerful iPB6 platform, the iPB6 Identity builds on the success of the Enterprise model by offering all the same features, with a few additional tricks up its sleeve. Built to withstand the African environment, fully stand-alone and unmatched intelligence in the industry perfectly complements the integrated iCLASS® / MIFARE contactless RFID reader, allowing multi-layered verification and authentication without the need for additional controllers. Combined with iPulse Fingerprint-on-Card technology the need to store prints locally is completely negated, making this unit ideal for massive sites that require more than 10,000 prints to reside on the device.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control readers |
| Model code | iPB6 Platform |
| Reader Type | RFID |
| Standalone/ Networkable | Standalone |
| Additional info | Part of the powerful iPB6 platform, the iPB6 Identity builds on the success of the Enterprise model by offering all the same features, with a few additional tricks up its sleeve. Built to withstand the African environment, fully stand-alone and unmatched intelligence in the industry perfectly complements the integrated iCLASS® / MIFARE contactless RFID reader, allowing multi-layered verification and authentication without the need for additional controllers. Combined with iPulse Fingerprint-on-Card technology the need to store prints locally is completely negated, making this unit ideal for massive sites that require more than 10,000 prints to reside on the device. |
You might be interested in these products
- See other HID products
- HID Access control cards/ tags/ fobs
- HID Access control controllers
- HID Access control software
Related Whitepapers
Three Essential Reasons To Upgrade Your Access Control Technology In 2022
Physical Access Control In Higher Education
Mobile Access- What You Need To Know (Part 1)
