Check Out Our Special Report On Cybersecurity
HID Mercury™ M5-8RP Controller
Technical Specification
- Make: HID
- Model code: Mercury™ M5-8RP
- Series: M5 Bridge
- Controller Type: Networkable
- Voltage: 12 V DC
HID Mercury's historic M5 Bridge is one of the lines of controllers designed for interoperability with legacy third-party access control systems. The M5 Bridge was built from the existing HID Mercury controller platform and has been redesigned to fit the specific physical parameters of Casi Micro5 enclosures used in Picture Perfect™, Secure Perfect™ and Facility Commander™ access systems. Key Benefits: Delivers plug and play format for a “screwdriver-less” changeover in Casi upgrades Provides a bridge from legacy systems to new and future access control systems Provides all current and future HID Mercury feature sets and future feature upgrades to the traditional Mercury platform Does not require power management controller (standard in the legacy products)
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control controllers |
| Model code | Mercury™ M5-8RP |
| Controller Type | Networkable |
| Electrical Specifications |
Voltage: 12 V DC Power Consumption: 36 mA |
| Physical Specifications |
Dimensions mm: 260 x 89 x 17.5 Weight g: 113 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 50 C (32 ~ 122 F) Operating Humidity %: 5 ~ 95 |
| Additional info |
HID Mercury's historic M5 Bridge is one of the lines of controllers designed for interoperability with legacy third-party access control systems. The M5 Bridge was built from the existing HID Mercury controller platform and has been redesigned to fit the specific physical parameters of Casi Micro5 enclosures used in Picture Perfect™, Secure Perfect™ and Facility Commander™ access systems. Key Benefits:
|
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control software
Related Whitepapers
The Truth Behind 9 Mobile Access Myths
6 Good Reasons To Embrace Mobile Credentialing
Three Essential Reasons To Upgrade Your Access Control Technology In 2022

