deisterGo is your personal notifier to stay in control of your deister system.You can individually set up many different types of notifications according to what is important to you or your users. deisterGo works with all deister systems, from access control, key management, smart storage, textile management, proof of visit, people protection, asset management to digital locking systems.All notifications are easily configured in the Commander Connect software, which centrally controls and manages all deister systems.
Digital locking cylinders for a smarter door
The doorLoxx digital locking system makes it significantly easier and cost-effective to change from a conventional master-key locking system with mechanical keys to an electronic access control system. The portfolio offers the right solution for any situation. Easy installation for any door. The digital locking components are battery operated and exchange data wirelessly.
They are available in a variety of formats, for example cylinders and digital handles. Our portfolio includes an updaters, controllers and online readers, which link the locking components to the system. Full scalability makes it possible to operate a system without PC software as equally as with Commander Connect, which offers all the performance characteristics of professional access control systems.
Energy-saving wireless technology
airLink is the deister wireless standard designed to integrate digital locking components and an updater into a system by means of wireless transmissions. Sophisticated energy management ensures very little drain on the battery. This allows the digital locking components to regularly exchange data, receive new access rights and transmit their own access log to the system. At the same time all data is secured by powerful 128 bit AES encryption.
It is possible to achieve ranges up to 30 m indoors, and as much as 100 m outdoors.
The right solution for all Doors
The doorLoxx portfolio of digital locking components covers a variety of formats to offer the right solution for all doors and applications.
All digital locking components are based on the same technical concept: the mechanics are separated from the reading technology. The electronic for the reading technology is in a reading head that is the same in all locking components and can easily be exchanged. That way it is easy to keep the system up to date and secure.
The battery life is the same for all digital locking components and lasts for 5 years with 60,000 activations or a standby of 10 years or 100.000 activations in a shorter timeframe.
所有数字锁定组件配有our radio connection airLink, which can be used for the „heartbeat“ or to download the events and manage online the access rights in all locking components.
Digital cabinet lock DCL 3
Secure storage of valuables in cabinets or lockers - with the reliable and electronic cabinet and furniture lock from deister electronic. The elegant electronic lock with its timeless design does not require any cables, can be installed quickly and can be centrally managed with our Commander Connect software. Integration into a professional building and asset management software is possible at any time.
In addition to common reading technologies such as MIFARE® DESFire and LEGIC®, the lock also supports Bluetooth™, which means that it can be conveniently opened with a mobile phone. In addition, the patent-pending energy management system allows a battery life of up to 60,000 activations, which is twice as much as most other cabinet locks on the market.
So, if you are looking for a cabinet lock that can be used individually, is rugged and features unrivalled energy management, then look no further than the DCL 3 digital cabinet lock from deister electronic.
Security threats continue to evolve. Technology has also matured and counters this increased risk. Yet most organizations continue to use legacy access control credentialing technologies. This presents increased vulnerabilities and the threat requires modern technology solutions that meets this dynamic threat now and in the future. Existing credentials, readers and controllers must be integrated, since replacing everything is logistics and cost prohibitive.
How do you transition Casi-Rusco, AWID or HID prox to a modern secure reading technology? You need a supplier that has the know-how and expertise to analyze your existing access control credentialing system and create solutions to manage the required transition.
Move your access control system to the next Era, choose deister to help you create and manage the transition to an optimally secure credentialing system.
We consult with you to choose the best secure credential technology for your security profile and show you how to implement the processes of credential management and credential production properly to avoid security breaches.
Our Triple Technology™ readers support a seamless transition to a new credential technology where old credentials can either be updated on the go through our readers or exchanged during normal operation of your organization while old credentials are still being used in parallel.
The future is now. Integrate Mobile phones and use our trusted cloud services to make your access control system future proof. All our current reader and wireless readers offer Bluetooth connectivity and we offer retrofit adapters to enable existing readers to communicate via Bluetooth as well.
Our Infinity Readers™ are Triple Technology™ readers which can read up to 3 different reading technologies. Thus both card credentials and mobile credentials can be used with the same reader. Also Triple Technology™ supports the seamless transition from old to new technology without interrupting your daily operation. Infinity Readers™ may be the last readers you’ll ever need.
The locker cabinet portfolio offers different compartment sizes, which can be freely combined with one another to create the desired system solution. An RFID chip installed in or attached to the device allows the user to remove or return the device simply by placing it against a compatible reader with integrated antenna, the device is then automatically identified in the compartment. An LED lights up to indicate successful removal/return.
If space is a premium it is possible to hang the RFID chip on the device. When removing or returning a device, the user simply inserts the keyTag into a slot in the compartment. Inserting or removing the keyTag is electronically logged when the device is removed or returned.
The bloxx system is ideally suited for the administration and storage of e.g. car keys and vehicle documents. bloxx consists of modules and can be assembled as required. There are different modules available with e.g. 10 wide or 20 narrow drawers. As an option it is possible to fit each drawer with an RFID reader.
The bloxx system is operated via a 17 inch touch screen. In addition, other features such as cameras can be integrated to capture documents. bloxx provides the freedom to use a third party PC and operating software.
The C4+ and C6+ terminals have now been given an intuitive and uniform user interface. Simplicity and clear menu structures are the main focus in order to make operation as easy as possible for new users. The design of both user interfaces follow the same concept, so that a user can operate both terminals without further introduction.
Terminals can now also be used virtually as an app called "deisterWallet" or on a PC as a browser application called "deisterCockpit".
This allows users to send key withdrawals to the system from anywhere, check the status of a key, and look up which keys they have taken. In addition, users can perform many other functions such as making reservations or filling out extensive return questionnaires.
射频识别技术的帮助下是可能的identify and manage devices, work equipment and items. For that purpose, an RFID chip is either installed in, attached to or hung on the device in the form of a tag. The data required to clearly identify the device or item is stored in the RFID chip. As soon as a device is removed or returned the RFID chip is automatically recognized by the antenna installed in the compartment. That ensures each removal and return is electronically detected and logged.
RFID chips do not require a battery and are as such completely maintenance free. As a benefit, their service life is practically unlimited.
Distinguishing features of our TSU 200 reader include extremely robust die-cast aluminium housing and the compact design with integrated antenna. The TSU 200 boasts a range of 7 m.
Our portfolio of passive transponders has been specifically developed for different materials to ensure it is also possible to achieve the best-possible range on glass or metal.
The special layout (patent pending) of the antenna integrated in the ISO card means it can be carried either way round as well as close to the body without impairing the range. Dual technology cards are also available with near field and long-range readers for enhanced levels of convenience.
The eyeFour ANPR camera can be installed in parallel or as an alternative to identify the driver by reading the vehicle’s licence plate. Thanks to identical interfaces it is easy to integrate both, the tranSpeed long range reader as well as the eyewatch cameras into other systems.
Controllers such as the OCU 8 complete the tranSpeed system. The top-hat rail compatible controller is primarily used in the area of access control and long-range identification.
For increased security requirements, secure end-to-end encryption is possible. The configuration of authorizations is comfortably handled via the "Commander Connect" software.
The Smart4 is a compact, 4-slot electronic key management system that can manage single or multiple keys. Its design is based on ease of use, where the user simply presents his credential and the system automatically releases only the keys he is authorized to take.
The system provides operational continuity with built-in battery backup and a local database that continues to work during network failures, server failures and power outages.
Our compact proxSafe key box maxx 6U with space-saving automatic shutter door and elegant design guarantees efficient key management for modern office environments. The electronic key box with robust steel housing is available in different versions for single keys, narrow key bunches or with slots for larger key bunches if required. Several key boxes can be combined and expanded with each other and can be easily operated with only one central terminal.
Thanks to our maintenance-free, robust keyTag with integrated RFID chip, all keys are securely locked in the maxx key box via slot locking, are not visible due to the shutter lock and are therefore doubly protected against manipulation.
To remove the key, the shutter door of the key box automatically opens and the slot of the selected key lights up red. After removal, the shutter door closes automatically and stops automatically if there is a hand underneath the shutter door.
The key cabinet flexx is available in five different sizes, which can be individually combined using the modular principle. In this way, small, compact systems from 16 key slots, or even large key depots with space for several thousand keys can be combined. The modular design offers maximum capacity in a small space and the possibility of adapting the system to a specific room or expanding it later.
The cabinets can be individually configured with the necessary, flexible slot modules, named keyPanels, and can be easily expanded or changed as needed, even at short notice. Depending on the number and size of the key bundles, keyPanels are available with different slot sizes. In addition, specific panels can be integrated for the controlled transfer of ISO cards and radio equipment.
For key dispensing, the users identify themselves at the terminal, the door of the key depot opens and the key can be taken from the lighted slot. Thanks to the slot interlocks, all keys are doubly secured and, even when the door is open, can only be removed with the corresponding authorization.
The C4+ and C6+ terminals have now been given an intuitive and uniform user interface. Simplicity and clear menu structures are the main focus in order to make operation as easy as possible for new users. The design of both user interfaces follow the same concept, so that a user can operate both terminals without further introduction.
The keyTag is the heart of a key management system. Each keyTag has a unique identity so that its location within the cabinet is known.
The most important and critical part of the system must perform all of the time to ensure that you have access to the keys when you need them, that’s why proxSafe uses the most advanced identification technology available - RFID.
Automate opening, starting and locking
With vanLoxx, a vehicle can be safely managed and operated. vanLoxx is an automatic door and vehicle control system designed to save time and ensure safety.
Access to the driver‘s cabin or the freight compartment is only granted to drivers with a valid transponder. Readers are installed at the various doors on the vehicle. The driver simply holds his transponder against the reader and the motorised locking elements automatically unlock the doors.
When leaving the vehicle, the vanLoxx system automatically locks the entire vehicle. If the first door falls into lock, the entire vehicle is locked automatically. While driving, certain doors remain unlocked in the event of an accident.
The start of the engine is also controlled by the vanLoxx system. The driver presents the same transponder to a driver terminal and, after successful identification, can start the vehicle at the push of a button.
The transponder completely replaces the vehicle key. Not only does the vanLoxx system make vehicle operation safer, it also saves an enormous amount of time. After simple preparation of the vehicle, the vanLoxx system is quickly installed and the return on investment is quickly apparent through higher efficiency and long-lasting product quality.
Comprehensive recording of mobile and stationary security services
dataLog is the market leading proof-of-visit and patrol verification system, that records the presence and location of security, cleaning and maintenance personnel at given locations and times.
For over 37 years deister electronic has been providing robust and reliable systems, which meet the requirements of both commercial and industrial applications.
dataLog systems allow better use of staff, improves efficiency, and provide accurate and fast audit information on work carried out. Most importantly they highlight any checks that were missed, so that appropriate action can be taken.
的主要组件dataLog proof-of-visit system are a handheld data collector, location checkpoints and management software. Checkpoints are fixed to locations to be visited, and the worker carries a robust handheld data collector which they use to read the checkpoint when it is visited. The checkpoints identification number and time of the visit is recorded by the data collector.
dataLog systems are ideal to determine the location of security guards and other workers where security, safety, servicing or cleaning checks need to be done. deister dataLog systems are used globally for manned guarding operations and many other applications where a mobile worker’s attendance at a given location needs to be verified.
Designed for use in potentially hazardous environments, the guardiX II EX is the ideal solution for chemical and petrochemical applications. With no buttons or moving parts our intrinsically safe guardiX II EX meets the requirements of the EU ATEX directive and is water resistant.
Efficient laundry management for workwear and pool laundry
For laundries, hospitals and care facilities, as well as throughout industry, supplying employees with workwear, pool laundry and uniforms is often a challenge.
The teXtag textile management solution allows you to automate the issue, return and administration of pool laundry, workwear and uniforms. Providing visibility throughout the entire textile cycle including: Centralised as well as decentralised issue and return of clothing, despatch of used clothing to the laundry and delivery of cleaned and repaired clothing.
Individually planned room solutions work like a walk-in wardrobe. When entering and leaving the stock room, employees’ clothing is automatically identified and recorded as they pass through the revolving doors.
Intelligent compartment systems facilitate the decentralised issue and return of textiles and, thus, vastly reduce the time spent by employees in the stock room.
On-site storage, standalone and yet integrated into the system
The battery-operated Digital Safe is a robust key safe for indoor and outdoor use. The weatherproof IP65 housing is suitable for all weather conditions.
The Digital Safe can be opened using credentials or via app - the reading technology is freely selectable and all popular reading technologies such as mifare®, NFC™ or Bluetooth® are supported. The Digital Safe can also be seamlessly integrated into an existing access control system and can be opened with the same access cards.
The Digital Safe can also be installed flush with the wall. This installation option provides the highest possible mechanical protection for the digital safe. It also minimizes weather influences.
Whether installed outdoors on remote sites or flushmounted into a wall, the Digital Safe is a secure place for your keys or valuables on site that you can remotely manage and integrate into your system. The 70 mm diameter has been deliberately chosen to be large enough to provide enough space for storing keys, ISO cards and larger key rings.
As an option, the removal and return of the item inside the digital safe can be monitored by an RFID-based slot inside and an RFID dongle on the item.
The RFID dongle, a so-called keyTag, has a built-in RFID chip which is read and electronically logged each time the item is removed and returned in the slot.
This allows monitoring and tracing whether, for example, a key is in the digital safe or has been returned to it after use.
Configuration, Control and Reporting
With the Commander Connect software, all deister systems can be centrally managed and configured. Information is collected centrally and can be called up at any time. The output of individually configured reports takes the form of e-mail, print file or export in different file formats.
The assignment of user rights and application-related functions can be done with just a few mouse clicks. The client-server architecture allows site-dependent operation via the web browser and minimizes hardware requirements and costs. The connection to third-party systems is made via web services or customer-specific interfaces, which allows the Commander Connect to be optimally integrated.
Easy and reliable identification with RFID
无论在医疗服务、设施和public access, public authorities or in industry, the task of protecting people is of the utmost importance, with intelligent technology required to protect areas subject to inherent risks. That also includes protecting personnel working in environments with a high potential for aggression such as in employment centres and social security offices or those employed in lone worker positions. Based on the latest developments in wireless data transmission, amanTag systems from deister electronic are utilised in environments such as these. With amanTag it is possible to control and limit the freedom of movement of people within a building on the one hand, and localise and protect the people
inside the building on the other. The system consists of active transponders and reader devices, Locators. The active transponder carried by a person is detected by the Locator within range. Locators are not only able to detect transponders, they are also able to control doors and alarms, for example, to close off or allow access to and from different areas.
The management software is tailored to the respective applications. It offers intuitive, user-friendly operation and is equipped with interfaces to connect to other communication and information systems.
The Locator is a main component of the amanTag systems. It is installed in the respective zones to be monitored or on a door requiring monitoring. The active transmission radius can be set individually within a range of 1.5 m - 7 m to suit the environment. That makes it possible to clearly define the protection or monitoring zones. There are 2 versions available with different functional ranges: the LCA 500 T with a range of 1.5 - 5 m and the LCA 700 T with a range radius of 1.5 - 7 m. It is possible to operate the Locator in standalone mode or in a network system. The modular design of the system ensures it can be extended at any time.
Reliable identification in order to ensure transparent processes in digital companies
工业过程在数字公司要求full transparency and a high degree of individualisation. Our RFID solutions close the gap between the real and the digital world – and thus develop new value creation potentials along the entire production and supply chain. We are already providing the industry of tomorrow with a unique, comprehensive and integrated range of RFID systems for customised applications.
The number of product variants is on the rise, and both production and the supply chain are becoming increasingly complex as a result. As such, the best solution is to choose processes which not only keep the complexity manageable, but are also cost-effective and a safe investment.
Are you looking for flexibility in your production management, efficient asset management, the ability to reliably retrace products and components and intelligently synchronise your supply chain?
Look no further. As a leading provider of industrial identification systems, deister electronic is driving development, and rolling out the technology of tomorrow, today. Our integrated and scalable portfolio offers the perfect solution for every field of application and requirement - with transparency, efficiency and flexibility.
Our TSU readers are distinguished by their extremely robust cast aluminium housing with compact design and integrated antenna. As such, they can also be installed in smaller spaces. The reader and antenna are contained in an integral housing and are perfectly co-ordinated with one another prior to leaving the factory, making trimming or regularly adjusting antennae and laying antenna cables are a thing of the past. The TSU 200 achieves a range of up to 7 m, the TSU 100 a range of up to 3 m.
The operating status is indicated on the clearly visible LED display (yellow, green and red). All connections on the reader are designed as M12 connector assemblies. A durable industry standard and water-tight cable connection ensure a high degree of reliability. The TSU 220 is compatible with four field bus technologies.
The intelligent solution for waste identification
自动车辆,聪明的废弃物容器nd efficient recycling plants: Industry 4.0 has arrived in the waste disposal and processing industry. The waste management industry 4.0 is automated and individualised. On-board computers and ID systems as well as efficient weighing areas are part of the standard repertoire of a modern waste management company.
Chipped waste bins, mobile applications and software solutions for route optimisation make everyday work easier and make processes faster, more transparent and more efficient:
Conserving resources and saving time and money are the order of the day. The increasing interconnectedness through waste apps and smart bins is being massively driven forward. Demand-oriented disposal leads to more efficient processes and thus also to increased planning reliability.
This strengthens the competitiveness of companies and creates new growth opportunities. Digital documents will determine the future of waste management. Digitalisation in waste disposal is advancing.
The LFR 4 reads disposal containers with HDX and FDX transponders and identifies the antenna‘s transponder and reference numbers, which can be transferred to tablets or the on-board computer. The auto-trim function ensures quick installation and immediate system functionality. If required, up to 4 antennas can be connected. Due to the auto trim function, different tooth and body antennas can also be combined.
The antenna has a reading range of up to 5 cm and a high mechanical stability. The mounting location is predefined by mounting directly on the comb lift. The tooth antenna ensures a fast and valid reading of HDX or FDX transponders, independent of the lifter or the containers.
All disposal containers with HDX and FDX transponders are identified quickly and reliably, even if mixed. The auto-trim function ensures quick installation and immediate system readiness. The reading range of up to 20 cm makes it ideally suited for containers made of plastic or metal.
The rear comb antenna can be perfectly mounted behind the dumping comb and is therefore ideally suited when the installation of a tooth antenna is not possible. The use of the rear comb antenna allows different container sizes to be attached and read out on both rear loaders and side loaders.
The TSU readers impress with their extremely robust aluminium die-cast housing with compact design. Reader and antenna can also be installed in confined spaces. Reader and antenna are built into one housing and optimally matched to each other by the manufacturer. This enables reliable adjustment of the reading performance! The TSU 200 achieves a reading range of up to 7 m. The operating status is clearly signalled via LEDs. All connections on the reader are designed as M12 connectors.
The Quadro Handheld is the latest generation of the rugged handheld scanner. It is equipped with LF, HF and UHF reading technologies. Optionally, a fourth reading technology, a QR/barcode scanner, can be retrofitted. After scanning the handheld is easily read via a USB interface. A special vehicle cradle is available for use in vehicles.