Honeywell Security PWM2KIC Intelligent Controller

Technical Specification

Features:
  • Make: Honeywell Security
  • Model code: PWM2KIC
  • Controller Type: Networkable
  • No of Cardholders: 600,000
  • Offline Capabilities: Yes
Read more
Additional info:

 An advanced access control hardware architecture capable of providing solutions for large enterprise applications 32-bit architecture, TCP/IP support, flash memory, large local cardholder database, and large reader and I/O module support Supports up to 64 Readers and up to 3 separate additional Micro5 enclosures via RS485 Pro-Watch handles system configuration, alarm/event monitoring and operation of the Intelligent Controller via TCP/IP In the event of a communication break the Intelligent Controller is fully capable of operating off-line, making access control decisions independently of Pro-Watch Connectivity to the host computer is accomplished via TCP/IP network connection 

Read more
Make Honeywell Security
Manufacturer Honeywell
Category Access Control>Access control controllers
Model code PWM2KIC
Controller Type Networkable
No of Cardholders 600,000
Offline Capabilities Yes
Networkable Yes
Communication Type TCP/IP, RS485
Universal / Wiegand Reader Interface Yes
Physical Specifications Dimensions mm: 289 x 213 x 27
Environmental Specifications Operating Temp oC: 0 ~ 70 C (32 ~ 158 F)
Operating Humidity %: 0 ~ 95
Additional info
  •  An advanced access control hardware architecture capable of providing solutions for large enterprise applications
  • 32-bit architecture, TCP/IP support, flash memory, large local cardholder database, and large reader and I/O module support
  • Supports up to 64 Readers and up to 3 separate additional Micro5 enclosures via RS485
  • Pro-Watch handles system configuration, alarm/event monitoring and operation of the Intelligent Controller via TCP/IP
  • In the event of a communication break the Intelligent Controller is fully capable of operating off-line, making access control decisions independently of Pro-Watch
  • Connectivity to the host computer is accomplished via TCP/IP network connection 
Download PDF version Download PDF version

Related Whitepapers

Cybersecurity in Keyless Access Management

Three Essential Reasons To Upgrade Your Access Control Technology In 2022

Securing Unmanned Infrastructure at the Network Edge

$common_vars['trending_topic_article_popup'][0]->title

Cequence Becomes First API Security Company To Partner With Aramco Digital