We believe that the best technology is created by professionals that have experienced firsthand what it’s like to be in the field installing a system or programming software. We know what it takes to secure a facility properly and provide the end user with a solution that instills confidence and safety.
At PDK we are passionate about creating technology to enhance the security, safety and overall experience of both the professionals that are installing electronic access control and those that live with and use the system each day. We have thousands of systems managing tens of thousands of doors throughout North America alone. We continue to create technology every day to enhance our products and the products of our technology partners.
An access controller for every situation
The Cloud Node is the main system panel and is the gateway to the pdk io cloud platform. Each site requires one Cloud Node with an Internet connection. The Cloud Node then communicates with all local door controllers while storing all data on-site in case of an internet outage. With the pdk io API, the Cloud Node becomes a fully integrated access control solution.
Red Outdoor Controller
Pdk’s Red™ Gate Outdoor Controller includes built-in Ethernet connectivity and self-discovery, simplifying IP configuration and functionality. Additional plug-and-play connection options are available by simply purchasing a Red PoE++ Module Kit. The Red Gate is equipped with OSDP functionality.
Network * POE * Wireless
Eight Door / Ten Floor Controller
Pdk’s Red™ 8 controller includes built-in Ethernet connectivity and self-discovery, simplifying IP configuration and functionality. The Red 8 is equipped with OSDP functionality, an onboard Altronix power supply, and a fully supervised power circuit that monitors input, output, battery voltage, and overall controller health.
Use our WiMAC Wireless Door Controllers for those hard-to-reach areas such as gates and detached structures. WiMAC eliminates lengthy wire runs, conduit, and trenching, allowing you to say goodbye to costly and time-consuming jobs
The Cloud Node delivers full cloud access control with its easy to use plug and play interface. While connecting to IP and/or wimac™ wireless controllers, streamline the entire programming process with full configuration from any web enabled device.
Full mobile management allows for complete control whether you are in the office or on the road. The pdk mobile app does not restrict which features are available for mobile management. We give you full control of every feature in the system from any Internet connected device.
Real-time customizable alerts keep you in the know. Whether it relates to people, doors or events, you can create email and text alerts that let one or more people know what’s happening. Instant alerts are a powerful tool when comes to the safety and security of your facility.
Keep tabs on who’s coming and going with real-time live monitoring of system activity. Security personnel can compare the image of the authorized cardholder in the software verses the actual person scanning the card.
With six months of data protection stored in the cloud you’re ready for any calamity mother nature may throw in your way. Rest assured your entire system is backed up each and every night.
System software updates happen real-time giving you the latest features as they are launched. Never worry again about what version of software you are running or if the manufacturer will end-of-life your system.
PDK readers Experience total functionality PDK readers fit any credential application with Bluetooth, standard prox, vandal-proof, and keypad readers.
High Security Readers
ProdataKey’s Red™ Readers are in a class of their own, with OSDP secure connectivity, high (13.56MHz) and low-frequency (125 kHz) communication, and mobile-ready options. Red Readers are now one of the most secure and versatile readers on the market today, handling every application, from your daily install to the most secure implementation.
Finally. A Bluetooth Reader With Real Intent.
The all-new touch io Bluetooth reader enhances user experience while upholding the highest level of security. Using a mobile device as a credential, touch io allows users to keep their phone in their pocket for hassle-free entry.
Strength and Safety
Perfect for indoor/outdoor applications, allowing users to access secure areas using proximity credentials or PIN. Add extra security with two-factor authentication on keypad readers, requiring users to provide credentials and PIN to gain access.
Intelligent and Cost-Effective. Enjoy the flexibility of using traditional readers that fit any application. The mullion style reader is ideal for door frame applications or use the single gang reader for wall-mounting applications.
Total Reliability
The Push Button Reader, equipped with a rugged backlit keypad, weatherproof design, and a durable zinc alloy casing, is built for applications where durability is key. The Push Button Reader, offers the ability to unlock doors with proximity credentials, PIN, or the flexibility to configure two-layer security by requiring users to present a credential and enter a PIN to gain access.
Heavy-Duty Stainless Steel Reader
The hd reader is the perfect balance between form and function. With its sleek and rugged design, the hd reader is ideal for any outdoor facility or modern indoor office space. In addition to its eye-catching design, the hd reader is built for applications where durability is key. The reader is equipped with a heavy-duty, weather-proof IP67 stainless steel enclosure that’s built to withstand vandalism and harsh outdoor environments.
The all-new touch io Bluetooth reader enhances user experience while upholding the highest level of security. Using a mobile device as a credential, touch io allows users to keep their phone in their pocket for hassle-free entry.
High-Security Cloud Nodes
to use mobil touch
If a phone is lost or stolen, its owner can immediately deactivate the credential by remotely wiping the phone with a tool like “Find My Phone,” a precaution he or she is likely to take out of concern for other personal data also stored on the device. By contrast, if a wallet or keys are lost that contain a card or fob, the credential remains active until the company’s system administrator is notified of the loss – which may sometimes take days.
Yes! In order for touch io to work properly, users must keep the Bluetooth on their device active. If a user turns Bluetooth off, the touch io app notifies them that their mobile credential will no longer be active. By utilizing Bluettoth Low Energy, the touch io app should have very little impact on a devices battery life.
System administrators can fine-tune the read distance in the touch app. Touch io can read a mobile credential from as far as 30 feet away. To avoid unintentional openings, we don't recommend extending the read distance beyond where a typical user will stand as they approach the door.
If a phone is lost or stolen, its owner can immediately deactivate the credential by remotely wiping the phone with a tool like “Find My Phone,” a precaution he or she is likely to take out of concern for other personal data also stored on the device. By contrast, if a wallet or keys are lost that contain a card or fob, the credential remains active until the company’s system administrator is notified of the loss – which may sometimes take days.
The possibilities are endless Pdk io provides
greater opportunities for third-party integration.
Pdk’s open API allows customers to integrate their
access control system with many other third-party platforms.
24435 North 20th Drive, Phoenix, Arizona 85085, United States
Open today | 08:00 am – 04:00 pm |
CORTEL Technology Solutions
24435 N. 20th Drive Suite 100, Phoenix, AZ 85085
Copyright © 2024 CORTEL Technology Solutions - All Rights Reserved.