NIS2 compatible controller. Highly reliable, it can be used for access control in high-security facilities. Integrated door controller with encrypted card readers for controlling any mechanical access device.
...
...
...
...
...
Main properties
  • Standalone or server-based operation
  • Can store 250 000 events and 200 000 identifiers
  • The number of controlled doors is freely configurable. It can control up to 4 doors in one direction or 2 doors in two directions.
  • Encrypted communication (SSCP, AES128)
  • Predor equipped with smart power supply for scheduled battery testing
  • 2 programmable inputs, 2 programmable relay outputs
  • TCP/IP, CAN, RS-485, SSCP, Wiegand interfaces
  • Enhanced security for fire and tamper inputs

NIS2, encryption

We have integrated the French STid product family, a pioneer in encrypted card readers, into the Predor system. STid's proprietary SSCP protocol and AES128 encryption protects data over the entire data line from end-to-end (SSCP add-on panel must be connected). The Predor system uses the most up-to-date encryption algorithms on all channels.

INTEGRABILITY

The Predor Phantom controller has a much more powerful processor and more memory than its predecessor. It can be easily integrated with modern security systems thanks to its many new peripherals. We can implement integration with any system to meet specific requirements.

SIMPLE INSTALLATION

The system creates a wiring diagram for each controller according to the current settings, which can even be printed out.

STANDALONE MODE OF OPERATION

The controller can store up to 100 000 users, 200 000 IDs and 250 000 events, so it can perform access control tasks perfectly in standalone mode, without any server connection.

SIMPLE AND QUICK CONFIGURATION

Automatic network discovery allows the client to automatically find all networked controllers. The complete setup of the system to be installed can be done at home, all you need to do is upload the settings on site.

PROGRAMMABLE INPUTS AND OUTPUTS

2-2 inputs and relay outputs can be used for integration with other systems, devices or for multi-stage control. Examples include probing or package inspection.

Contact our team for a personalised quote for your business

Contact us for a personalised quote or online software demonstration

Request an online presentation Request for an offer Request a recall
Request an online presentation Request for an offer Request a recall

Discover our products

Enterprise time tracking system.
Enterprise time tracking system.

It reduces administrative burdens and increase your company's efficiency. Managers can get a quick and easy overview of important worktime information.

Go to datasheet
Access Control
Access Control

Its flexibility and modular structure makes it ideal for small-, middle- and large scale companies alike, can adapt is for their needs.

Go to datasheet
Intelligens Shift Planner
Intelligens Shift Planner

The system automatically detects suboptimal shift plans, and helps to avoid both under- and over-allocation.

Go to datasheet
Cloud based worktime tracking system
Cloud based worktime tracking system

Keep track of your remote working employees. No server maintenance or large upfront cost necessary.

Go to datasheet
Predor mobile app
Predor mobile app

Use our free mobile app to access your security reports and monitor your system real time, anywhere, anytime.

Go to datasheet
Office POE worktime terminal
Office POE worktime terminal

Its clean design, built in RGB LED strpe and Wi-Fi compatibility makes this product perfect for offices and community spaces.

Go to datasheet
Biometric worktime terminal
Biometric worktime terminal

The device can easily be mounted on a wall bracket, and offices can take advantage of its wireless capabilites.

Go to datasheet
Phantom controller
Phantom controller

This extremly reliable product can serve high security locations, and it can control any mechanical access control device.

Go to datasheet
Encrypted, vandal-proof card readers
Encrypted, vandal-proof card readers

The card reader family integrated with Predor represents the cutting edge of high security. It protects the card data with the most sophisticated encyption, end-to-end.

Go to datasheet
Container entry point, Üvegkapu
Container entry point, Üvegkapu

Complete entry point assembled and delivered in a container. We offer ubeatable prices for excellent 10 and 20 legged container. Predor is compatible with the hungarian Üvegkapu system.

Go to datasheet