CORTEL Technologies

602-861-4724

  • Home
  • Services
  • Products
  • News / Blog
  • Support
  • About
  • Privacy Policy
  • More
    • Home
    • Services
    • Products
    • News / Blog
    • Support
    • About
    • Privacy Policy

602-861-4724

CORTEL Technologies
  • Home
  • Services
  • Products
  • News / Blog
  • Support
  • About
  • Privacy Policy

 

We believe that the best technology is created by professionals that have experienced firsthand what it’s like to be in the field installing a system or programming software. We know what it takes to secure a facility properly and provide the end user with a solution that instills confidence and safety.

At PDK we are passionate about creating technology to enhance the security, safety and overall experience of both the professionals that are installing electronic access control and those that live with and use the system each day. We have thousands of systems managing tens of thousands of doors throughout North America alone. We continue to create technology every day to enhance our products and the products of our technology partners.

Total Flexibility

 

With our complete lineup of Network, PoE, and Wireless Door Controllers, you can get access control anywhere you need it.

RED- High-Security Cloud Nodes

RED- High-Security Cloud Nodes

RED- High-Security Cloud Nodes

 An access controller for every situation


The Cloud Node  is the main system panel and is the gateway to the pdk io cloud platform. Each site requires one Cloud Node with an Internet connection. The Cloud Node then communicates with all local door controllers while storing all data on-site in case of an internet outage. With the pdk io API, the Cloud Node becomes a fully integrated access  control solution.

Red Gateio

RED- High-Security Cloud Nodes

RED- High-Security Cloud Nodes

 Red Outdoor Controller

 

Pdk’s Red™ Gate Outdoor Controller includes built-in Ethernet connectivity and self-discovery, simplifying IP configuration and functionality. Additional plug-and-play connection options are available by simply purchasing a Red PoE++ Module Kit. The Red Gate is equipped with OSDP functionality.

 Network * POE * Wireless 

Red Eightio

Wireless Locations

Wireless Locations

 Eight Door / Ten Floor Controller 



Pdk’s Red™ 8 controller includes built-in Ethernet connectivity and self-discovery, simplifying IP configuration and functionality. The Red 8 is equipped with OSDP functionality, an onboard Altronix power supply, and a fully supervised power circuit that monitors input, output, battery voltage, and overall controller health.

Wireless Locations

Wireless Locations

Wireless Locations

 Use our WiMAC Wireless Door Controllers for those hard-to-reach areas such as gates and detached structures. WiMAC eliminates lengthy wire runs, conduit, and trenching, allowing you to say goodbye to costly and time-consuming jobs 

Cloud Management

Cloud Management

Cloud Management

  The Cloud Node delivers full cloud access control with its easy to use plug and play interface. While connecting to IP and/or wimac™ wireless controllers, streamline the entire programming process with full configuration from any web enabled device. 

Mobile Management

Cloud Management

Cloud Management

 Full mobile management allows for complete control whether you are in the office or on the road. The pdk mobile app does not restrict which features are available for mobile management. We give you full control of every feature in the system from any Internet connected device. 

Instant Alerts

Cloud Management

Instant Alerts

 Real-time customizable alerts keep you in the know. Whether it relates to people, doors or events, you can create email and text alerts that let one or more people know what’s happening. Instant alerts are a powerful tool when comes to the safety and security of your facility.  

Live Events

Real-Time Updates

Instant Alerts

 Keep tabs on who’s coming and going with real-time live monitoring of system activity. Security personnel can compare the image of the authorized cardholder in the software verses the actual person scanning the card. 

Cloud Backups

Real-Time Updates

Real-Time Updates

 With six months of data protection stored in the cloud you’re ready for any calamity mother nature may throw in your way. Rest assured your entire system is backed up each and every night. 

Real-Time Updates

Real-Time Updates

Real-Time Updates

 System software updates happen real-time giving you the latest features as they are launched. Never worry again about what version of software you are running or if the manufacturer will end-of-life your system. 

PDK Readers

PDK readers Experience total functionality PDK readers fit any credential application with Bluetooth, standard prox, vandal-proof, and keypad readers.

RED High-Security Readers

RED High-Security Readers

RED High-Security Readers

High Security Readers

ProdataKey’s Red™ Readers are in a class of their own, with OSDP secure connectivity, high (13.56MHz) and low-frequency (125 kHz) communication, and mobile-ready options. Red Readers are now one of the most secure and versatile readers on the market today, handling every application, from your daily install to the most secure implementation.

touchio

RED High-Security Readers

RED High-Security Readers

Finally. A Bluetooth Reader With Real Intent.

 The all-new touch io Bluetooth reader enhances user experience while upholding the highest level of security. Using a mobile device as a credential, touch io allows users to keep their phone in their pocket for hassle-free entry.

ruggedreaders

RED High-Security Readers

standard readers

Strength and Safety

 Perfect for indoor/outdoor applications, allowing users to access secure areas using proximity credentials or PIN. Add extra security with two-factor authentication on keypad readers, requiring users to provide credentials and PIN to gain access.

standard readers

push button reader

standard readers

Intelligent and Cost-Effective. Enjoy the flexibility of using traditional readers that fit any application. The mullion style reader is ideal for door frame applications or use the single gang reader for wall-mounting applications. 

push button reader

push button reader

push button reader

Total Reliability 

The Push Button Reader, equipped with a rugged backlit keypad, weatherproof design, and a durable zinc alloy casing, is built for applications where durability is key. The Push Button Reader, offers the ability to unlock doors with proximity credentials, PIN, or the flexibility to configure two-layer security by requiring users to present a credential and enter a PIN to gain access.

HD Reader

push button reader

push button reader

Heavy-Duty Stainless Steel Reader 

The hd reader is the perfect balance between form and function. With its sleek and rugged design, the hd reader is ideal for any outdoor facility or modern indoor office space. In addition to its eye-catching design, the hd reader is built for applications where durability is key. The reader is equipped with a heavy-duty, weather-proof IP67 stainless steel enclosure that’s built to withstand vandalism and harsh outdoor environments.

Video

Touch

The all-new touch io Bluetooth reader enhances user experience while upholding the highest level of security. Using a mobile device as a credential, touch io allows users to keep their phone in their pocket for hassle-free entry.

PDK RED

High-Security Cloud Nodes

4 Ways

to use mobil touch

Frequently Asked Questions

If a phone is lost or stolen, its owner can immediately deactivate the credential by remotely wiping the phone with a tool like “Find My Phone,” a precaution he or she is likely to take out of concern for other personal data also stored on the device. By contrast, if a wallet or keys are lost that contain a card or fob, the credential remains active until the company’s system administrator is notified of the loss – which may sometimes take days. 


Yes! In order for touch io to work properly, users must keep the Bluetooth on their device active. If a user turns Bluetooth off, the touch io app notifies them that their mobile credential will no longer be active. By utilizing Bluettoth Low Energy, the touch io app should have very little impact on a devices battery life.


 System administrators can fine-tune the read distance in the touch app. Touch io can read a mobile credential from as far as 30 feet away. To avoid unintentional openings, we don't recommend extending the read distance beyond where a typical user will stand as they approach the door. 


 If a phone is lost or stolen, its owner can immediately deactivate the credential by remotely wiping the phone with a tool like “Find My Phone,” a precaution he or she is likely to take out of concern for other personal data also stored on the device. By contrast, if a wallet or keys are lost that contain a card or fob, the credential remains active until the company’s system administrator is notified of the loss – which may sometimes take days. 


pdk integrations

The possibilities are endless Pdk io provides 

greater opportunities for third-party integration. 

Pdk’s open API allows customers to integrate their

 access control system with many other third-party platforms.

Contact Us

Want to learn more about how Cortel Technology Solutions can help you run your business? Fill out the form below, we’ll be happy to provide more information on the most reliable, hassle-free and cost-effective technology systems available.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Customer Service and Technical Support

support@cortelcom.com

CORTEL Technology Solutions

24435 North 20th Drive, Phoenix, Arizona 85085, United States

602-861-4724

Hours

Open today

08:00 am – 04:00 pm

  • Privacy Policy

CORTEL Technology Solutions

24435 N. 20th Drive Suite 100, Phoenix, AZ 85085

602-861-4724

Copyright © 2024 CORTEL Technology Solutions - All Rights Reserved.