Videos
Loading the player ...
  • Offer Profile
  • deister electronic is an innovative, family owned global business with more than 40 years experience in developing electronic and mechanical products for security and industrial automation. Widely acclaimed for our expertise and specialist implementation of RFID technology within practical applications, from key management, access control and long-range identification (AVI) to logistics and process control.
Product Portfolio
  • Solutions

      • Software & System

          • Connected Systems

          • We Connect Security - Intelligently connected systems

            Integrated building security through intelligent combined security systems that are designed to work as one. From access control systems to camera monitoring, everything is setup, managed, and brought together in a single software management solution. All our hardware and software is designed and manufactured by us, allowing all devices and systems to be optimally integrated with one another. All products are designed to be compatible from the development stage, offering unsurpassed levels of functionality, reliability and ease of use.
          • deisterGo App

          • Notifications, alarms and events at your fingertips

            deisterGo is your personal notifier to stay in control of your deister system.You can individually set up many different types of notifications according to what is important to you or your users. deisterGo works with all deister systems, from access control, key management, smart storage, textile management, proof of visit, people protection, asset management to digital locking systems.All notifications are easily configured in the Commander Connect software, which centrally controls and manages all deister systems.

          • Computer Authentication

          • loxxIn - Secure access to your computers

            使用电脑给你访问数据重建rds, intellectual property and, of course, personal data. Entering complicated passwords is not a solution for permanent use of PC´s. It would be advantageous if one could unlock the computer screen contactlessly by the presence of a credential. Both problems can be solved by using the samecredential which is also used for access control. This login solution is fast, easy and the encryption of the credentials is much more secure than any password.
        • Digital Locking Systems

        • Online and offline access control

          Digital locking cylinders for a smarter door

          The doorLoxx digital locking system makes it significantly easier and cost-effective to change from a conventional master-key locking system with mechanical keys to an electronic access control system. The portfolio offers the right solution for any situation. Easy installation for any door. The digital locking components are battery operated and exchange data wirelessly.

          They are available in a variety of formats, for example cylinders and digital handles. Our portfolio includes an updaters, controllers and online readers, which link the locking components to the system. Full scalability makes it possible to operate a system without PC software as equally as with Commander Connect, which offers all the performance characteristics of professional access control systems.

            • airLink

            • Energy-saving wireless technology

              airLink is the deister wireless standard designed to integrate digital locking components and an updater into a system by means of wireless transmissions. Sophisticated energy management ensures very little drain on the battery. This allows the digital locking components to regularly exchange data, receive new access rights and transmit their own access log to the system. At the same time all data is secured by powerful 128 bit AES encryption.

              It is possible to achieve ranges up to 30 m indoors, and as much as 100 m outdoors.

              • Very low power consumption
              • 128 bit AES encryption
              • Strong wireless range
            • Digital Locking Components

            • The right solution for all Doors

              The doorLoxx portfolio of digital locking components covers a variety of formats to offer the right solution for all doors and applications.

              All digital locking components are based on the same technical concept: the mechanics are separated from the reading technology. The electronic for the reading technology is in a reading head that is the same in all locking components and can easily be exchanged. That way it is easy to keep the system up to date and secure.

              The battery life is the same for all digital locking components and lasts for 5 years with 60,000 activations or a standby of 10 years or 100.000 activations in a shorter timeframe.

              所有数字锁定组件配有our radio connection airLink, which can be used for the „heartbeat“ or to download the events and manage online the access rights in all locking components.

            • Electronic cabinet lock

            • Digital cabinet lock DCL 3
              Secure storage of valuables in cabinets or lockers - with the reliable and electronic cabinet and furniture lock from deister electronic. The elegant electronic lock with its timeless design does not require any cables, can be installed quickly and can be centrally managed with our Commander Connect software. Integration into a professional building and asset management software is possible at any time.

              In addition to common reading technologies such as MIFARE® DESFire and LEGIC®, the lock also supports Bluetooth™, which means that it can be conveniently opened with a mobile phone. In addition, the patent-pending energy management system allows a battery life of up to 60,000 activations, which is twice as much as most other cabinet locks on the market.

              So, if you are looking for a cabinet lock that can be used individually, is rugged and features unrivalled energy management, then look no further than the DCL 3 digital cabinet lock from deister electronic.

              • All common reading technologies are supported and can be changed at any time
              • Long battery life of up to 60,000 activations
              • Available with various levers
              • Elegant design, which fits into office furniture, cabinets and lockers
              • Easy to install and dismantle
          • 访问控制rol

          • Countering evolving security threats is now easy

            Security threats continue to evolve. Technology has also matured and counters this increased risk. Yet most organizations continue to use legacy access control credentialing technologies. This presents increased vulnerabilities and the threat requires modern technology solutions that meets this dynamic threat now and in the future. Existing credentials, readers and controllers must be integrated, since replacing everything is logistics and cost prohibitive.

            How do you transition Casi-Rusco, AWID or HID prox to a modern secure reading technology? You need a supplier that has the know-how and expertise to analyze your existing access control credentialing system and create solutions to manage the required transition.

            Move your access control system to the next Era, choose deister to help you create and manage the transition to an optimally secure credentialing system.

              • Cards

              • We consult with you to choose the best secure credential technology for your security profile and show you how to implement the processes of credential management and credential production properly to avoid security breaches.

                Our Triple Technology™ readers support a seamless transition to a new credential technology where old credentials can either be updated on the go through our readers or exchanged during normal operation of your organization while old credentials are still being used in parallel.

              • Mobile Credentials

              • The future is now. Integrate Mobile phones and use our trusted cloud services to make your access control system future proof. All our current reader and wireless readers offer Bluetooth connectivity and we offer retrofit adapters to enable existing readers to communicate via Bluetooth as well.

              • Readers

              • Our Infinity Readers™ are Triple Technology™ readers which can read up to 3 different reading technologies. Thus both card credentials and mobile credentials can be used with the same reader. Also Triple Technology™ supports the seamless transition from old to new technology without interrupting your daily operation. Infinity Readers™ may be the last readers you’ll ever need.

            • Smart Storage Solutions

            • Intelligent asset management systems with handling automation


              Automatic issue and return of valuables

              Are your important assets and resources used efficiently? It‘s often all to easy too lose track of who has what item, when it is last used and especially the condition that it is returned in. proxSafe smart storage systems identify who has your essential assets by controlling who has them with full audit and reporting capabilities. Users are identified by card, pin or biometrics allowing them to only take the items that they are authorised to have, ensuring you have complete accountability of your company’s shared portable equipment. Radios, test equipment, tools, laptops and much more can now be managed automatically so you know that the equipment is ready when you need it.
                • locker series S, M & L

                • Secure management of valuables

                  The locker cabinet portfolio offers different compartment sizes, which can be freely combined with one another to create the desired system solution. An RFID chip installed in or attached to the device allows the user to remove or return the device simply by placing it against a compatible reader with integrated antenna, the device is then automatically identified in the compartment. An LED lights up to indicate successful removal/return.

                  If space is a premium it is possible to hang the RFID chip on the device. When removing or returning a device, the user simply inserts the keyTag into a slot in the compartment. Inserting or removing the keyTag is electronically logged when the device is removed or returned.

                • bloxx

                • Modular drawer system

                  The bloxx system is ideally suited for the administration and storage of e.g. car keys and vehicle documents. bloxx consists of modules and can be assembled as required. There are different modules available with e.g. 10 wide or 20 narrow drawers. As an option it is possible to fit each drawer with an RFID reader.

                  The bloxx system is operated via a 17 inch touch screen. In addition, other features such as cameras can be integrated to capture documents. bloxx provides the freedom to use a third party PC and operating software.

                • Terminals

                • Easy use

                  The C4+ and C6+ terminals have now been given an intuitive and uniform user interface. Simplicity and clear menu structures are the main focus in order to make operation as easy as possible for new users. The design of both user interfaces follow the same concept, so that a user can operate both terminals without further introduction.

                • Virtual Terminals

                • Terminals can now also be used virtually as an app called "deisterWallet" or on a PC as a browser application called "deisterCockpit".

                  This allows users to send key withdrawals to the system from anywhere, check the status of a key, and look up which keys they have taken. In addition, users can perform many other functions such as making reservations or filling out extensive return questionnaires.

                • RFID

                • Maintenance free – can be installed everywhere

                  射频识别技术的帮助下是可能的identify and manage devices, work equipment and items. For that purpose, an RFID chip is either installed in, attached to or hung on the device in the form of a tag. The data required to clearly identify the device or item is stored in the RFID chip. As soon as a device is removed or returned the RFID chip is automatically recognized by the antenna installed in the compartment. That ensures each removal and return is electronically detected and logged.

                  RFID chips do not require a battery and are as such completely maintenance free. As a benefit, their service life is practically unlimited.

                  • Works without a battery
                  • 100% maintenance free
                  • Contactless, so no wear
              • Long-Range Identification (AVI)

              • Identify vehicles reliably

                Long-range identification made simple

                快速和可靠的远程识别lution automatically identifies both drivers and vehicles in any weather conditions. Queues in vehicle access and exit areas are a thing of the past. Ideal for car parks, traffic management and free-flowing vehicle access control (AVI). The technology is also suitable for monitoring rail traffic as well as vehicle access barriers in city centres, airports and at toll roads. Thanks to numerous interfaces it is possible to integrate tranSpeed seamlessly into other control systems – but it can also be used as a stand-alone solution. There is a wide range of transponders available; these include robust heavy-duty transponders, self-adhesive stickers for windscreens and ISO cards, which perfectly combine two reader technologies.
                  • TSU 200 long-range reader

                  • Passive long-range identification

                    Distinguishing features of our TSU 200 reader include extremely robust die-cast aluminium housing and the compact design with integrated antenna. The TSU 200 boasts a range of 7 m.

                    Our portfolio of passive transponders has been specifically developed for different materials to ensure it is also possible to achieve the best-possible range on glass or metal.

                    The special layout (patent pending) of the antenna integrated in the ISO card means it can be carried either way round as well as close to the body without impairing the range. Dual technology cards are also available with near field and long-range readers for enhanced levels of convenience.

                  • eyeFOUR camera

                  • Automatic Number Plate Recognition

                    The eyeFour ANPR camera can be installed in parallel or as an alternative to identify the driver by reading the vehicle’s licence plate. Thanks to identical interfaces it is easy to integrate both, the tranSpeed long range reader as well as the eyewatch cameras into other systems.

                  • Transponders for the windscreen

                  • Self-adhesive with vignette/sticker function

                    In addition to the encrypted deister “smart frame” for data security the windscreen transponder for vehicles identification features a vignette/sticker function; this is an additional safety measure to prevent the transponder being torn off.

                    The specially developed antenna facilitates optimum ranges through the windscreen as far as 7 m using a TSU 200 reader. To achieve a constant range in conjunction with different vehicle types the transponder is also equipped with a function to adapt the range. For instance, RRD stickers are affixed to the marked positions. This function makes it possible to reduce the identification range by either 66% or 33%. That ensures it is possible to identify different types of vehicles at the same distance to the reader.

                    • Fraud proof – tear proof
                    • Adjustable range
                    • “Smart frame” – data security
                  • POC

                  • Make RFID fields visible

                    When installing an UHF long-range identification system the challenge is always to place the readers and transponders in the best possible position to ensure all vehicles are reliably detected. The POC (patent pending) represents an optimum solution to the challenge.

                    POC behaves precisely the same as a transponder. The integrated LEDs display the available level of communication at every position in the field between the reader and transponder. Finding the best-possible position for the transponder is quick and effective. The POC is available for both passive and active transponders.
                  • Controller OCU 8

                  • Modular and flexible

                    Controllers such as the OCU 8 complete the tranSpeed system. The top-hat rail compatible controller is primarily used in the area of access control and long-range identification.

                    For increased security requirements, secure end-to-end encryption is possible. The configuration of authorizations is comfortably handled via the "Commander Connect" software.

                • Key Management Systems

                • Key management for efficient control of key handovers


                  Secure storage and electronic management of keys

                  Manual key management costs a lot of time and energy. A key is quickly lost, the trouble is enormous, searching for it is time-consuming and often unsuccessful. With more and more mechanical keys in circulation, you can quickly loose track. A manual issue of keys, e.g. for security-relevant buildings, rooms, commercial properties, industrial sites, vehicle parks and fleets, can result in an immense administrative effort, significant security gaps and very high costs.Would you like to save yourself this hassle and your valuable time by leaving the key chaos behind? Would you like to have a better overview and full control over your numerous keys? deister electronic provides efficient solutions for key management. With electronic key management, user access to individual keys can be pre-defined and clearly managed via the Commander Connect software.

                  All key removals and returns are automatically documented and can be retrieved easily. The intelligent key cabinet proxSafe ensures a transparent, controlled key transfer and an efficient management of from eight up to several thousand keys.

                  Of course, your key storage can be individually configured to your specific requirements based on the number of keys and key ring sizes. This is made possible by our cabinet models and flexible panels. Each key cabinet offers 24/7 access and is easy to set up and operate. Your key experience: a totally secure solution for 100% control over all your keys - and more resources for the essential tasks of the day.
                    • Electronic key box Smart4

                    • Compact & space saving

                      The Smart4 is a compact, 4-slot electronic key management system that can manage single or multiple keys. Its design is based on ease of use, where the user simply presents his credential and the system automatically releases only the keys he is authorized to take.

                      The system provides operational continuity with built-in battery backup and a local database that continues to work during network failures, server failures and power outages.

                      • Secure and compact
                      • Ease of use
                      • Remote key release through management software
                      • Features for continuity of operation
                    • Electronic key box maxx 6U

                    • Compact and elegant

                      Our compact proxSafe key box maxx 6U with space-saving automatic shutter door and elegant design guarantees efficient key management for modern office environments. The electronic key box with robust steel housing is available in different versions for single keys, narrow key bunches or with slots for larger key bunches if required. Several key boxes can be combined and expanded with each other and can be easily operated with only one central terminal.

                      Thanks to our maintenance-free, robust keyTag with integrated RFID chip, all keys are securely locked in the maxx key box via slot locking, are not visible due to the shutter lock and are therefore doubly protected against manipulation.

                      To remove the key, the shutter door of the key box automatically opens and the slot of the selected key lights up red. After removal, the shutter door closes automatically and stops automatically if there is a hand underneath the shutter door.

                    • Key management system "flexx"

                    • Modular and flexible

                      The key cabinet flexx is available in five different sizes, which can be individually combined using the modular principle. In this way, small, compact systems from 16 key slots, or even large key depots with space for several thousand keys can be combined. The modular design offers maximum capacity in a small space and the possibility of adapting the system to a specific room or expanding it later.

                      The cabinets can be individually configured with the necessary, flexible slot modules, named keyPanels, and can be easily expanded or changed as needed, even at short notice. Depending on the number and size of the key bundles, keyPanels are available with different slot sizes. In addition, specific panels can be integrated for the controlled transfer of ISO cards and radio equipment.

                      For key dispensing, the users identify themselves at the terminal, the door of the key depot opens and the key can be taken from the lighted slot. Thanks to the slot interlocks, all keys are doubly secured and, even when the door is open, can only be removed with the corresponding authorization.

                    • Terminals

                    • The C4+ and C6+ terminals have now been given an intuitive and uniform user interface. Simplicity and clear menu structures are the main focus in order to make operation as easy as possible for new users. The design of both user interfaces follow the same concept, so that a user can operate both terminals without further introduction.

                    • keyTag

                    • Smart reliable identification for your keys

                      The keyTag is the heart of a key management system. Each keyTag has a unique identity so that its location within the cabinet is known.

                      The most important and critical part of the system must perform all of the time to ensure that you have access to the keys when you need them, that’s why proxSafe uses the most advanced identification technology available - RFID.

                      • Includes integral keyring and seal
                      • Contactless, so no wear
                      • Works without a battery
                  • Vehicle Locking System

                  • Automatic Vehicle Locking System

                    Automate opening, starting and locking

                    With vanLoxx, a vehicle can be safely managed and operated. vanLoxx is an automatic door and vehicle control system designed to save time and ensure safety.

                    Access to the driver‘s cabin or the freight compartment is only granted to drivers with a valid transponder. Readers are installed at the various doors on the vehicle. The driver simply holds his transponder against the reader and the motorised locking elements automatically unlock the doors.

                    When leaving the vehicle, the vanLoxx system automatically locks the entire vehicle. If the first door falls into lock, the entire vehicle is locked automatically. While driving, certain doors remain unlocked in the event of an accident.

                    The start of the engine is also controlled by the vanLoxx system. The driver presents the same transponder to a driver terminal and, after successful identification, can start the vehicle at the push of a button.

                    The transponder completely replaces the vehicle key. Not only does the vanLoxx system make vehicle operation safer, it also saves an enormous amount of time. After simple preparation of the vehicle, the vanLoxx system is quickly installed and the return on investment is quickly apparent through higher efficiency and long-lasting product quality.

                    • Saves time by using automatic door control
                    • Increased safety through automatic vehicle locking
                    • Durable design for more than 300.000 operations
                    • Guard Tour Management

                    • Security guard and plant protection

                      Comprehensive recording of mobile and stationary security services

                      dataLog is the market leading proof-of-visit and patrol verification system, that records the presence and location of security, cleaning and maintenance personnel at given locations and times.

                      For over 37 years deister electronic has been providing robust and reliable systems, which meet the requirements of both commercial and industrial applications.

                      dataLog systems allow better use of staff, improves efficiency, and provide accurate and fast audit information on work carried out. Most importantly they highlight any checks that were missed, so that appropriate action can be taken.

                      的主要组件dataLog proof-of-visit system are a handheld data collector, location checkpoints and management software. Checkpoints are fixed to locations to be visited, and the worker carries a robust handheld data collector which they use to read the checkpoint when it is visited. The checkpoints identification number and time of the visit is recorded by the data collector.

                      dataLog systems are ideal to determine the location of security guards and other workers where security, safety, servicing or cleaning checks need to be done. deister dataLog systems are used globally for manned guarding operations and many other applications where a mobile worker’s attendance at a given location needs to be verified.

                        • RFID

                        • For maintenance free and reliable data collection

                          deister’s dataLog systems use RFID technology for checkpoints and data collectors. This ensures that the checkpoints are able to be installed in the harshest environments without the need for any maintenance or power supply. This technology is perfectly suited for use in outdoor areas, which need to be checked regularly.

                          deister’s dataLog products are contactless and the checkpoint is read simply by holding the data collector in proximity to the front of the checkpoint. Since checkpoints require no physical contact they can be painted over or installed in walls, woodwork or masonry.
                        • Intrinsically safe EX certified

                        • For use in potentially explosive environments

                          Designed for use in potentially hazardous environments, the guardiX II EX is the ideal solution for chemical and petrochemical applications. With no buttons or moving parts our intrinsically safe guardiX II EX meets the requirements of the EU ATEX directive and is water resistant.

                        • Event cards

                        • 额外的信息;快速报告n

                          Event cards allow you to report additional events which may be required during the patrol or checks being done. For example; window open, toilet leaking, maintenance required. The event cards can be carried with the data collector and when an event needs to be recorded simply hold the corresponding card in front of the data collector, the time and event will be logged.

                          You can choose the events you would like to report on depending on the environment or to address health and safety requirements.
                        • Checkpoints

                        • Robust and reliable

                          The RFID checkpoints are maintenance free and do not require any power. The small, inconspicuous checkpoints can either be glued or securely mounted using a special security screw.

                          The RFID checkpoints are resistant to temperature, weather and other environmental factors.
                        • guardiX II

                        • A rugged data collector for all day use

                          One of the many distinguishing features of the guardiX II data collector is that there are no buttons, switches or other external moving parts that could be prone to failure. Its clever design also means that there is no need for a hole for a sounder, instead the data collector vibrates when a checkpoint is read making it near silent in operation. An LED and vibration provide haptic feedback making it ideal for patrols or checks that need to be carried out in places such as in hospitals, prisons and hotels or in a noisy manufacturing environment where a sounder would not be heard by the user.

                          When a checkpoint is read its identification number along with the time and date are stored in the data collector for transmission and processing. The guardiX II is able to read up to 500,000 checkpoints from a pair of AA batteries thereby minimising downtime. In addition to reading our checkpoints the guardiX II collectors are also able to read other deister RFID transponders.
                        • guardiX Connect

                        • Remote collection of data

                          guardiX Connect transmits data immediately after completing each tour, without the need for a data transfer unit. Data is transmitted via the GSM network and securely encrypted via the deister Cloud.

                          This allows independence of any local infrastructure. The data remains securely encrypted at all times and is only decoded by your system.
                        • guardTrans

                        • Data transfer unit

                          The guardTrans is the data transfer unit for the guardiX II USB collectors. It is connected to a PC or laptop via the USB port and transfers the date when the collector is inserted. To guarantee maximum accuracy, the real-time clock in the guardiX II data collector is synchronized during the download operation.

                          LED and vibration provide haptic feedback when the data has been correctly downloaded.
                      • Laundry dispensing system

                      • Automated, centralised and decentralised textile management

                        Efficient laundry management for workwear and pool laundry

                        For laundries, hospitals and care facilities, as well as throughout industry, supplying employees with workwear, pool laundry and uniforms is often a challenge.

                        The teXtag textile management solution allows you to automate the issue, return and administration of pool laundry, workwear and uniforms. Providing visibility throughout the entire textile cycle including: Centralised as well as decentralised issue and return of clothing, despatch of used clothing to the laundry and delivery of cleaned and repaired clothing.

                        Individually planned room solutions work like a walk-in wardrobe. When entering and leaving the stock room, employees’ clothing is automatically identified and recorded as they pass through the revolving doors.

                        Intelligent compartment systems facilitate the decentralised issue and return of textiles and, thus, vastly reduce the time spent by employees in the stock room.

                        • Enormous cost savings thanks to inventory optimisation
                        • 24 / 7 availability of laundry items
                        • A reduction in the disappearance and loss of garments
                        • Permanent inventory and transparency throughout the laundry cycle
                          • Intelligent textile cabinets

                          • Decentralised laundry distribution and laundry return
                            The intelligent cabinet system comprises dispensing and return cabinets that locate the distribution and return of clothing and laundry where employees need it and thus reduce walking distances to get new or return used garments.

                            The intelligent cabinet system automatically identifies the user and the garments removed or returned and stores all transactions until they are retrieved by the higher-level system.

                            Due to the compact dimensions of the cabinets, only a small footprint is required for installation. So they fit everywhere and do not get in the way.

                            Particularly efficient: The cabinet systems can be used in parallel, thus avoiding waiting times.

                          • texCabinet - TCD 200 (Dispense)

                          • The TCD 200 laundry dispensing cabinet is a major component of textag systems. Each cabinet is equipped with an integrated access card reader to allow the user to operate the laundry storage cabinet without having to first seek out a central operating terminal. Simply hold your ID card in front of the reader integrated into the door handle and take out your laundry in less than 5 seconds. Access permissions are easily managed by our software.
                          • texReturn - TCR 50 / TCR 200 / TCR 250 / TCR 300 (Return)

                          • To return laundry, the user simply drops the laundry items through the opening in the return cabinet. The laundry is automatically recorded by the cabinet. When the cabinet is full, the laundry bag can be replaced in a few simple steps. The large laundry return cabinets TCR 200 / TCR 250 / TCR 300 are suitable for use with all standard wire container models. Depending on which texReturn model is used, between 150 and 300 garments can be returned. On the TCR 250 and TCR 300, there are 3 possible adjustable heights for the return flap and there is the option of locking
                          • texRoom solution

                          • Central stock room for clothing and textiles
                            The texRoom solution is individually planned and functions like a walk-in wardrobe. Entry and exit is granted through intelligent revolving doors or a gate, which automatically identify the garments taken by the wearer as well as the delivery of new garments. The room solution focuses on efficient and reliable detection of wearers and garments, as fast and efficient output is particularly important for many wearers in order to avoid waiting times and delays.

                            The laundry is simply returned using the return cabinets, which are placed in logistically sensible locations. The wearer simply deposits his laundry there and it is automatically accounted for accordingly.

                            The removal of new clothing is quick and easy: the wearer identifies himself with his ID card at the revolving door and enters the supply room, takes the desired clothing and leaves the room again through the revolving door - the removed clothing is automatically recorded and accounted for in the revolving door.

                            • Simplest operation: wearers only have to identify themselves by ID card at the revolving door or gate, the garment detection is fully automatic as they pass through.
                            • Extremely short process time: Garment acquisition is fast, parallel and uncomplicated
                            • Permanent inventory - 24/7 overview of textile inventory in real time

                        • On-Site Storage

                        • ELECTRONIC SAFE FOR SITE MANAGEMENT OF WIDESPREAD INFRASTRUCTURE

                          On-site storage, standalone and yet integrated into the system

                          The battery-operated Digital Safe is a robust key safe for indoor and outdoor use. The weatherproof IP65 housing is suitable for all weather conditions.

                          The Digital Safe can be opened using credentials or via app - the reading technology is freely selectable and all popular reading technologies such as mifare®, NFC™ or Bluetooth® are supported. The Digital Safe can also be seamlessly integrated into an existing access control system and can be opened with the same access cards.

                          The Digital Safe can also be installed flush with the wall. This installation option provides the highest possible mechanical protection for the digital safe. It also minimizes weather influences.

                            • The secure on-site safe

                            • Safe storage of keys, credentials or valuables

                              Whether installed outdoors on remote sites or flushmounted into a wall, the Digital Safe is a secure place for your keys or valuables on site that you can remotely manage and integrate into your system. The 70 mm diameter has been deliberately chosen to be large enough to provide enough space for storing keys, ISO cards and larger key rings.

                              • 70 mm diameter
                              • Enough space for ISO cards and larger key rings
                              • 独立的本地IT基础设施
                            • Content surveillance

                            • Optional RFID slot

                              As an option, the removal and return of the item inside the digital safe can be monitored by an RFID-based slot inside and an RFID dongle on the item.

                              The RFID dongle, a so-called keyTag, has a built-in RFID chip which is read and electronically logged each time the item is removed and returned in the slot.

                              This allows monitoring and tracing whether, for example, a key is in the digital safe or has been returned to it after use.

                            • Commander Connect

                            • Configuration, Control and Reporting

                              With the Commander Connect software, all deister systems can be centrally managed and configured. Information is collected centrally and can be called up at any time. The output of individually configured reports takes the form of e-mail, print file or export in different file formats.

                              The assignment of user rights and application-related functions can be done with just a few mouse clicks. The client-server architecture allows site-dependent operation via the web browser and minimizes hardware requirements and costs. The connection to third-party systems is made via web services or customer-specific interfaces, which allows the Commander Connect to be optimally integrated.

                          • Personal Safety Systems

                          • amanTag - Personal protection systems

                            Easy and reliable identification with RFID

                            无论在医疗服务、设施和public access, public authorities or in industry, the task of protecting people is of the utmost importance, with intelligent technology required to protect areas subject to inherent risks. That also includes protecting personnel working in environments with a high potential for aggression such as in employment centres and social security offices or those employed in lone worker positions. Based on the latest developments in wireless data transmission, amanTag systems from deister electronic are utilised in environments such as these. With amanTag it is possible to control and limit the freedom of movement of people within a building on the one hand, and localise and protect the people

                            inside the building on the other. The system consists of active transponders and reader devices, Locators. The active transponder carried by a person is detected by the Locator within range. Locators are not only able to detect transponders, they are also able to control doors and alarms, for example, to close off or allow access to and from different areas.

                            The management software is tailored to the respective applications. It offers intuitive, user-friendly operation and is equipped with interfaces to connect to other communication and information systems.

                              • BabyGuard®

                              • To quickly raise the alarm

                                Best possible protection against abduction and babies being accidentally switched on postnatal wards The intelligent security technology offers extensive protection to prevent newborn babies being abducted or accidentally switched. BabyGuard® adds a great deal more security to the daily routines in postnatal wards. At the same time it helps to promote the image of the clinic, which underlines its duty of care by employing a professional system solution that serves everyday needs. The high level of functionality offered by BabyGuard® makes it an efficient baby protection system that is widely accepted by mothers, nurses and doctors alike.
                              • SeniorGuard

                              • Protection to prevent dementia patients wandering off from care facilities

                                The care sector often looks after dementia patients that are at risk of wandering off unnoticed, so are in need of protection. Discreet and visually appealing Locators in conjunction with appropriate transponders worn around the wrist guarantee residents the best possible protection and freedom of movement. With its high level of functionality, the SeniorGuard® makes a significant contribution towards the character of an “open house”, while taking the strain away from organizational processes within the care home.
                              • PersonalGuard

                              • A small transmitter with a button protects staff against attacks

                                For their own safety staff working in dangerous environments carry a keyFob transponder with them. If a member of staff feels at risk all that is required (of him/her) is to press a button on the transmitter to trigger an alarm. In the event the alarm is triggered the transponder immediately transmits an unambiguous code to the Locator with information about the whereabouts of the person in question. Colleagues, porters or security personnel receive the alarm message on their PC, telephone, mobile or pager and can react immediately.
                              • Mobile alarm pager in care facilities and clinics

                              • Patients and residents in care facilities and clinics wish to be able to move freely and safely in the building, with the possibility of calling for help with the aid of a mobile alarm pager if they should get into difficulties at any time. The amanTag solution makes this possible with a special patient keyFob4 / pendant. A press of a button on the transponder suffices to reliably trigger an alarm and localise the caller. The caller receives visible feedback on his/her transponder to confirm the call for help has been made.
                              • LCA series

                              • Dual-Technology Locator

                                The Locator is a main component of the amanTag systems. It is installed in the respective zones to be monitored or on a door requiring monitoring. The active transmission radius can be set individually within a range of 1.5 m - 7 m to suit the environment. That makes it possible to clearly define the protection or monitoring zones. There are 2 versions available with different functional ranges: the LCA 500 T with a range of 1.5 - 5 m and the LCA 700 T with a range radius of 1.5 - 7 m. It is possible to operate the Locator in standalone mode or in a network system. The modular design of the system ensures it can be extended at any time.

                                • Standalone and network capable systems
                                • Bidirectional communication
                                • Clearly defined protection zones with a setting range of 1.5 - 7 m
                                • Reliable in adverse ambient conditions Easy to install and operate
                              • Transponder portfolio

                              • All fields of application covered
                                • For mother and baby
                                • For patients and dementia sufferers
                                • For personal protection
                                • For personal
                                • For installers
                            • Industrial Identification

                            • High performance RFID solutions as an IoT interface

                              Reliable identification in order to ensure transparent processes in digital companies

                              工业过程在数字公司要求full transparency and a high degree of individualisation. Our RFID solutions close the gap between the real and the digital world – and thus develop new value creation potentials along the entire production and supply chain. We are already providing the industry of tomorrow with a unique, comprehensive and integrated range of RFID systems for customised applications.

                              The number of product variants is on the rise, and both production and the supply chain are becoming increasingly complex as a result. As such, the best solution is to choose processes which not only keep the complexity manageable, but are also cost-effective and a safe investment.

                              Are you looking for flexibility in your production management, efficient asset management, the ability to reliably retrace products and components and intelligently synchronise your supply chain?

                              Look no further. As a leading provider of industrial identification systems, deister electronic is driving development, and rolling out the technology of tomorrow, today. Our integrated and scalable portfolio offers the perfect solution for every field of application and requirement - with transparency, efficiency and flexibility.

                                • Passive HF RFID systems

                                • Secure identification for process control

                                  Our efficient readers are ideally suited for use in industrial automation, logistics and process control. With their compact design and the great read/write range, the readers can easily be installed in smaller spaces, difficult locations and in metal environments.
                                • HF transponders

                                • Suitable for any requirement

                                  The passive HF disc transponders have been specifically developed to withstand even the severest conditions (IP67), and are especially robust and durable. In addition, special On Metal transponders are encapsulated in the housing, designed to be mounted on metal whilst achieving optimum ranges. The transponders have high data rates for rapid identification, great read/write ranges, and are ideally suited for use in logistics, automation, on vehicles and in outdoor use.
                                • RFID system components

                                • Easily equip devices with RFID functionality

                                  The compact 13.56 MHz RDK 1 ISO read/write module with an integrated antenna is ideally suited for easy integration into mobile equipment, HMI, medical devices and printer technologies with little space available. Configurations with an external antenna and customer-specific software are available, as well.
                                • Passive UHF RFID systems

                                • Efficient and with an integrated antenna

                                  Our TSU readers are distinguished by their extremely robust cast aluminium housing with compact design and integrated antenna. As such, they can also be installed in smaller spaces. The reader and antenna are contained in an integral housing and are perfectly co-ordinated with one another prior to leaving the factory, making trimming or regularly adjusting antennae and laying antenna cables are a thing of the past. The TSU 200 achieves a range of up to 7 m, the TSU 100 a range of up to 3 m.

                                  The operating status is indicated on the clearly visible LED display (yellow, green and red). All connections on the reader are designed as M12 connector assemblies. A durable industry standard and water-tight cable connection ensure a high degree of reliability. The TSU 220 is compatible with four field bus technologies.

                                • UHF transponders

                                • Robust, durable and adaptable

                                  我们的无源超高频转发器是健壮的,持久的nd specifically designed for even the severest industry conditions (IP67). They are also optimized for being mounted on metal. With the large read angle and extensive reach, they are perfectly adapted for applications in logistics, plant automation, vehicle identification, etc.
                                • HF and UHF desktop readers

                                • Rapid scanning of goods

                                  Our desktop reader makes it quick and easy to assign transponders to the management system. The compact desktop reader is connected to the PC via USB. The desktop readers are available as a read only or a read/write unit.
                              • Waste Disposal Management

                              • BiTech® - Smart cities need smart waste management logistics

                                The intelligent solution for waste identification

                                自动车辆,聪明的废弃物容器nd efficient recycling plants: Industry 4.0 has arrived in the waste disposal and processing industry. The waste management industry 4.0 is automated and individualised. On-board computers and ID systems as well as efficient weighing areas are part of the standard repertoire of a modern waste management company.

                                Chipped waste bins, mobile applications and software solutions for route optimisation make everyday work easier and make processes faster, more transparent and more efficient:

                                Conserving resources and saving time and money are the order of the day. The increasing interconnectedness through waste apps and smart bins is being massively driven forward. Demand-oriented disposal leads to more efficient processes and thus also to increased planning reliability.

                                This strengthens the competitiveness of companies and creates new growth opportunities. Digital documents will determine the future of waste management. Digitalisation in waste disposal is advancing.

                                  • LFR 4 universal reader

                                  • Reader for tooth and body antennas

                                    The LFR 4 reads disposal containers with HDX and FDX transponders and identifies the antenna‘s transponder and reference numbers, which can be transferred to tablets or the on-board computer. The auto-trim function ensures quick installation and immediate system functionality. If required, up to 4 antennas can be connected. Due to the auto trim function, different tooth and body antennas can also be combined.

                                  • AZF Tooth antenna

                                  • Perfect reading range, direct mounting

                                    The antenna has a reading range of up to 5 cm and a high mechanical stability. The mounting location is predefined by mounting directly on the comb lift. The tooth antenna ensures a fast and valid reading of HDX or FDX transponders, independent of the lifter or the containers.

                                  • ABF Body antenna

                                  • Reliable detection, optimum reading range

                                    All disposal containers with HDX and FDX transponders are identified quickly and reliably, even if mixed. The auto-trim function ensures quick installation and immediate system readiness. The reading range of up to 20 cm makes it ideally suited for containers made of plastic or metal.

                                  • ASF Rear comb antenna

                                  • Best reading performance with compact design

                                    The rear comb antenna can be perfectly mounted behind the dumping comb and is therefore ideally suited when the installation of a tooth antenna is not possible. The use of the rear comb antenna allows different container sizes to be attached and read out on both rear loaders and side loaders.

                                  • UHF long range reader

                                  • High range, rugged design, IP67

                                    The TSU readers impress with their extremely robust aluminium die-cast housing with compact design. Reader and antenna can also be installed in confined spaces. Reader and antenna are built into one housing and optimally matched to each other by the manufacturer. This enables reliable adjustment of the reading performance! The TSU 200 achieves a reading range of up to 7 m. The operating status is clearly signalled via LEDs. All connections on the reader are designed as M12 connectors.

                                  • THH-Handheld

                                  • LF, HF, UHF & barcode data collection

                                    The Quadro Handheld is the latest generation of the rugged handheld scanner. It is equipped with LF, HF and UHF reading technologies. Optionally, a fourth reading technology, a QR/barcode scanner, can be retrofitted. After scanning the handheld is easily read via a USB interface. A special vehicle cradle is available for use in vehicles.