Showing: 1 - 1 of 1 RESULTS

Keep it small and simple. A single office building with users and 50 doors may not have the most extensive physical infrastructure, but it shares the common need to secure a wide variety of access points with a flexible system that is easy to manage. This new standard will prove to be highly effective, even for technology challenged users.

Online Monitoring ProAccess SPACE enables you to monitor in real-time not just lock battery status or if an update is needed, but also who accessed what door and when, if a door has been left open, intrusions etc. Total control all in real-time. Popular usage options set-up and managed using ProAccess SPACE include free assignment mode, family mode and, scheduling by calendars, and much more.

The end-user receives a message that access rights have been given so nothing more is required than to present the smartphone to the lock to confirm access and go!

All data transmission and the mobile key itself are encrypted and secured against cloning. Eliminate the logistical problems that come with the management and distribution of key cards. Automatic key assignment is a tool that enables you to encode key cards directly via a wall reader at the main access points.

This can be done the first time a user presents his card, saving time, hassle and the need to queue for card validation. Department operator enables properties to be managed independently while still retaining shared access privileges. The Matrix Access function simplifies and streamlines the link between users and doors making access planning simple and straightforward. Lockdowns can be performed remotely through wireless locks, or locally on AMOK escutcheons. Anti-passback The anti-passback feature is designed to prevent misuse of the access control system by establishing a specific sequence in which access cards must be used in order for the system to grant access.

Cards can be customized both internally and externally. Event Stream The Event Stream option generates real-time notifications to third party systems. The idea is to filter the auditrail and sending the selected events so that the order system can process the received information and perform a real-time action.

CCTV, fire alarm, traditional access control, etc. SALTO ProAccess SPACE Software is a powerful access control management tool that enables you to program access time zones for each user, manage different calendars and obtain audit trails from each door to see who has passed through it. The software includes special functions such as automatic door status changes, anti-passback and relay management. Thanks to its advanced software features, SALTO ProAccess SPACE is also one of the most user-friendly and powerful software products for the access control management of stand-alone wireless devices, and IP online devices in one converged complete access control platform for the user, keys and doors management.

XS4 platform. With a large variety of models, XS4 electronic escutcheons fit virtually any door, including those with narrow frames. They are also suitable for use at fire doors and emergency exits. Automatic Key Assignment. Department Operator.As we continue to monitor and react to the COVID situation we are announcing some updates to our policies and processes to ensure the health and safety of our employees, partners, and customers.

For the US and Canada, effective immediately and until further notice, we are taking the following actions:. The implementation of new firmware for the IQ2. All existing IQ2. New design, improved user experience, and new features help planners and architects better envision and design new lock projects.

SALTO has upgraded MyLock, the online lock configuration customization tool that allows users to choose and see potential door configurations prior to purchase.

The day tournament draws participants, fans, and attention from across the globe and as a result, demands the utmost in security for the to year-old baseball and softball players, their coaches, families, and thousands of spectators. Its proven reliability and recognised stability brings wireless access control to every business, providing vastly better functionality and performance than is possible in a traditional mechanical solution with a flexible management system that requires no software installation nor the cost of a fully-wired electronic product.

Find out more here www.

salto reader

Inspiration, dedication and passion have led SALTO to become one of the world's top five manufacturers of electronic access control systems in little more than 10 years.

From its inception inSALTO was created with one objective: to devise a world-class access control system that was simple to use and extremely efficient, giving users the ability to control all their access needs and secure all their doors without complex and expensive wiring.

We use own and third party cookies to improve our services and to offer you our contents based on your interests. If you continue browsing, you are giving your consent to the installation and use of the referred cookies and to our Cookies Policy. Further information regarding our Cookies Policy. Canada English. Hong Kong. Middle East ME. South Africa. United Kingdom. March 30 Covid Update- A Note to our Partners and Customers As we continue to monitor and react to the COVID situation we are announcing some updates to our policies and processes to ensure the health and safety of our employees, partners, and customers.

For the US and Canada, effective immediately and until further notice, we are taking the following actions: Read more Read more Product Range.

Access control on-the-go and in real time. Current Components Latest additions How it works. Customer solutions. SALTO solutions are in use in diverse commercial environments around the world, including: office buildingss retailers of all types banks and insurance companies manufacturing and industrial sites.

salto reader

Responsible investments in security. Very clear Always safe. Your Phone is Your key. SALTO solutions are in use in thousands of properties around the world, including prestigious boutique hotels luxury hotels resort hotels vacation properties holiday resorts. Everywhere Everybody. Securely moving goods and people.

Our company.

salto reader

Our company From its inception inSALTO was created with one objective: to devise a world-class access control system that was simple to use and extremely efficient, giving users the ability to control all their access needs and secure all their doors without complex and expensive wiring.Idesco 8 CD 2. Idesco EPC 2. Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be?

Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security.

Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials deciding whether or not the bearer of those credentials is permitted admission access control is an incredibly broad term.

Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area.

Entrance control — such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorised personnel using their credentials — their face, fingerprints, PIN number, fob, key card etc — and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm.

Fastlane Optical turnstiles will not physically stop an unauthorised person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred.

These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorised users from entering. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol.

Or, it could be an unidentified person who needs to be escorted from the premises. The two systems are complementary. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud.

Security-as-a-Service SaaSwhich encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus.

However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date.

Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training.

SALTO XS4 WRDB0A_K ANSI Wall Reader 2.0 With Keypad

This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary.

In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded.

The role of the cloud The cloud has proven to be a highly functional, flexible, and convenient method for organisations to leverage as part of their strategies to protect and modernise their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalising on a recurring monthly revenue model RMR. But then why has there been so much resistance to this change?

Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core.

However, the security of public cloud service providers is integral to their success because their business depends on it. The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols.

The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments.

Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished.Idesco 8 CD 2.

Idesco EPC 2. Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be?

Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security.

Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials deciding whether or not the bearer of those credentials is permitted admission access control is an incredibly broad term.

Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control — such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate.

Entrance control is the hardware responsible for keeping people honest If access control verifies authorized personnel using their credentials — their face, fingerprints, PIN number, fob, key card etc — and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm.

Fastlane Optical turnstiles will not physically stop an unauthorized person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorized users from entering.

The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol.

Or, it could be an unidentified person who needs to be escorted from the premises. The two systems are complementary. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud.

Security-as-a-Service SaaSwhich encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus.

However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers.

SALTO Access Control Readers

This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service.

Von Duprin electrified panic bar with Salto Reader

For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month.

This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The Role of the Cloud The cloud has proven to be a highly functional, flexible, and convenient method for organizations to leverage as part of their strategies to protect and modernize their facilities.SALTO peripheral products provide the ideal solution for those access points where online connectivity is needed, or where interaction with other systems or electric powered devices such as elevators, roller shutter doors or barriers is required.

XS4 2. It is specially designed for use on busy, high traf c doors that need additional strength. XS4 E40 with local lockdown function.

This version also works with the majority of European mortise locks and cylinders. The tough, vandal-resistant construction protects this range against attack and unauthorised entry without losing flexibility or control. Its audit trail facility can identify entry and exit actions, and can be tted to almost any type of Euro pro le door.

It can also operate with a wide range of locks including Swiss cylinders. The minimalistic design of the RFID reader looks stylish and discreet on any door. It also offers the choice of a wide range of designer lever handles and finishes.

This lock is a balance between ease-of-use, security and warranty. The XS4 Euro lock is a mortise lock with latch projection which means the latch is automatically projected and deadlocked when the door is closed. The new latch projection function increases security by making it impossible to gain access by using plastic cards. SALTO offers different mortise locks suitable for narrow profile doors. The LE9W is a mortise lock compatible with DIN lock cases that offers a high quality product, and also allows use with an automatic deadbolt projection.

The SALTO XS4 One escutcheon is a revolutionary stand-alone electronic lock thanks largely to the level of technology packed inside that brings together the convenience of an offline point -- easy installation and no wires — with virtually the same kind of power and performance of an online point. It includes the latest electronic components in order to warranty a future proof feature compatibility The XS4 One version is specially designed to fit most Euro profile doors, even narrow profile framed doors.

This mortise lock is secure and robust, as it has an intelligent system that projects the deadbolt automatically when the door is closed to ensure that it is properly locked. The XS4 GEO mortise cylinder is specially designed to fit most doors that are equipped with a mortise lock that need a mortise cylinder.

The trim ring also protects the lock from attacks coming vertically. It is designed to provide high levels of security and fit all standard doors in ANSI markets.Read more. With KS you can send a Mobile Key to anyone with a smartphone, so no need to hand over tags or even do a remote opening.

Issuing and receiving access is much easier and more flexible. No more managing mechanical keys. Simply grant access to individuals or groups for selected locks and timeframes. See who goes where and when, and block users on the go. Depending on your industry, company size and requirements, Keys as a Service offers three different solutions to best fit your business needs. Flexible to fit the needs of any type of business.

KS standard functionalities. Integration possibilities. Easy to set up. You can select functionalities from KS while preserving your brand. Your own logo, brand identity and URL. Option to integrate Mobile Key into your existing app. Option to add KS Services.

XS4 Wall readers & XS4 Door controllers

With our scalable API, not only preserve your brand but create your completely customized access control solution. Access to our locking platform. Build your own dream solution with your brand identity. Host your own user data. It can be daunting to find the right access control fit to meet the needs of your business. Keys as a Service makes access control a smarter way to manage business access.

No matter the size of your business. Enjoy flexibility, scalability, reliability, and the ability to manage access from anywhere, anytime.SALTO peripheral products provide the ideal solution for those access points where online connectivity is needed, or where interaction with other systems or electric powered devices such as elevators, roller shutter doors or barriers is required.

The XS4 GEO mortise cylinder is specially designed to fit most doors that are equipped with a mortise lock that need a mortise cylinder. The trim ring also protects the lock from attacks coming vertically.

It is designed to provide high levels of security and fit all standard doors in ANSI markets. It is specially designed for use on busy, high traffic doors that need additional strength.

Salto WRLUD24B series User Manual

It combines the highest safety along with ease of use and installation. The minimalistic design of the RFID reader looks stylish and discreet on any door. It also offers the choice of a wide range of designer lever handles and finishes.

It includes integrated electronic detection to monitorize in real-time the door status, providing an easy to install solution without any additional hardware or drilling needs.

With the SALTO XS4 cylindrical latch, you can replace existing traditional knob sets and upgrade them with a state of the art electronic access control system.

Easy, simple and quick way to replace existing traditional knob sets, and upgrade them with a state of the art electronic access control system with SALTO's cartridge cylindrical latch. A wireless version of the XS4 DIN glass door lock is also available for real-time access control requirements. This wall reader has been specially designed to fit ANSI standard electric boxes to make the installation easier. This product allows for the additional use of a Personal Identification Number PIN keypad option, increasing the security by using a double authentication and more enhanced opening modes.

They read encrypted data from the carriers and then communicate it to the door controllers. All models are IP 56 compliant making them suitable for use indoors and out, including environments exposed to harsh weather conditions. Compatible with ISO These models need a window, which is necessary for reader antenna operation. The Contactless SALTO modular wall reader with external case is specially designed for outdoor installation on uneven surfaces.

The wall reader reads data from the carrier and then communicates it to the door controller. The reader is IP 56 compliant and features a built-in stainless steel external case making it suitable for use indoors and out, including environments exposed to harsh weather conditions. The key pad provides increased security as dual identification is needed to access the door. The wall reader reads data from the carrier and then communicates to the door controller.

Smart, innovative and designed with aesthetics in mind, the SALTO Modular Wall Reader Pedestal is a new product developed to allow for the installation of readers and controllers in places where they cannot normally be fitted, such as on door frames or walls. Depending on your needs, you can choose a single or double base to fit a wall reader and a keypad.

Both bases include an internal gasket to prevent water ingress and have several fixing points to allow for adjustment during installation. It offers a single wall reader connection and a single output control relay. Access control changes can be carried out on the SALTO software and are then actioned at the door controller in real time.