• Suggested offers
  • 0 results. Did you mean ?
  • Suggested categories
  • 0 results. Did you mean ?
  • Suggested companies
  • 0 results. Did you mean ?
  • Suggested offers
  • 0 results. Did you mean ?
  • Suggested categories
  • 0 results. Did you mean ?
  • Suggested companies
  • 0 results. Did you mean ?

Key and deposit box management system: ecos keysafe 20

Safety cabinets

This product is temporarily unavailable.
Think about consulting similar products.

“ "ecos keysafe 20:The Stand-alone Key management system" ”
Ask for a quote Receive Documentation Contact the supplier

Benchmark : ECKINDUS

The PC-independent solution for the management of your important keys

ecos systems offers an easy-to-install and especially cost-effective key management system of the highest safety standard through the optimization of functionalities as well as through the standardization of all production processes.

With this advanced development of its safety systems, ecos systems has answered up to the need for a user-friendly and compact key management system.

With ecos keysafe, a practical and robust key management system that is suited especially for a small number of up to 20 protection-worthy keys has been developed. Usage as well as a complete tracing and documentation of the individual user profile is realized through the touch screen display of the integrated industrial processor directly on-the-spot.

“Plug and Play”
The installation and operation of the system is done the easiest way – absolutely independent of a PC. User’s guide through the integrated touch screen display allows for a fast initial operation also by untrained personnel. Of course, all utility data can be imported through USB stick directly into spreadsheet programs like MS Excel, or established and optionally obtainable ecos systems software modules and evaluated in accordance with tried and tested methods.

Fast and clear access
User access is done either through PIN code or optionally through non-contacting identification system via card or key ring pendants (Proximity Tag). After successful verification, the door opens automatically. Authorized keys are then unlocked and rendered identifiable with blue LED illumination for a better overview.

Functions and configurations
• The issuance of access authorization for up to 100 users with the read-in of the non-contacting means of identification, issuance of a date of expiration and assignment of an additional individual PIN (four to eight digit number) for maximum safety standards, time window per week day and user

• Integrated data memory with memory capacity in excess of one year (up to 25,000 entries) upon daily usage of every key

• Alarms in case of impending data overflow, unauthorized removal, unauthorized opening, power failure, if door is not properly closed and door is not properly locked

• Visual and acoustic alarm signals on the spot

• Switchover of alarm to a superior alarm system through potential free contact

• Emergency power supply through battery charging switch for a minimum of 24 hours

• Evaluation and saving through customary spreadsheet programs after data transfer using USB stick

See also

Precautionary rules Safety features and equipment Warning signals Surface protection Safety doors Safes Industrial stairs Anti-slide surface

Buyers

Find your suppliers Complete your request and let our teams find you the best deals available.

Suppliers

Find your future clients List your products and services to enhance your web presence and receive qualified enquiries.