Let us show you in an amusing way why you should only use fort knox® fingerprint scanner for your safety!
Since it is extremely difficult to advertise an emotionless product, such as a fingerprint scanner, we have created a small comic which explains one of the main advantages and the greatest technological advantage of the fort knox® fingerprint scanner:
The active fake and spoof finger detection, as well as the connection to external system, such as intrusion detection systems (burglar alarm), home automation, access control etc.
If you liked our clip, please give it a “thumbs up" and share it on Facebook, Twitter and Co.
We now wish you lots of fun and good entertainment with our fort knox® clip.
why use fort knox® fingerprint scanner?
Because life is not easy and the operating conditions for a fingerprint scanner much less. What are the benefits of slogans like “never key again" if the system does not meet the everyday adversities. A little sweat is often enough and a normal scanner does not recognize your finger any more. In addition, not every finger belongs to a young person with ideal characteristics.
Forget the problems with fingerprint scanners from other manufacturers!
– injured or
– dirty fingers
fort knox® recognizes them all, reliable!
fort knox® fingerprint scanner make your life easier!
Due to fake and spoof finger detection, the fort knox® fingerprint scanner actively prevents false fingerprints or imitations by unauthorized, criminal persons.
If the fort knox® fingerprint scanner detects such an attempt, e.g. the security service, or the police could be called automatically or a picture / video will be recorded, etc.
fort knox® fingerprint scanners are ideally suited for your application too. No matter whether it is time and attendance, access control or automation. fort knox® is your best choice.
fort knox® can be used indoors, and thanks to IP65, also for outdoors too.
fort Knox® is sea water resistant and can be used up to -20 ° C.
Thanks to PoE, a network cable is sufficient for the operation of fort knox®.
If a 2-wire cable is available only, no problem! You can also find the right accessories in our portfolio for your project also.
- Access control
- Time and attendance
- Automation (KNX, EIB, Loxone, openHAB, FHEM, homeserver, facilitypilot etc.)
3-step commissioning and local administration
Easy commissioning in only 3 steps: fort knox® finger scanner
Connect the network cable and power supply.
Install software on a Windows PC, select user name and set password.
.. you already can get started and set up the first user.
Local administration: fort knox® finger scanner
You can manage users from anywhere. You only need the software, your user name and password.
If you are not in the same building / network, we recommend you accessing via VPN connection.
Make more with fort knox®
Make more of your fort knox® finger scanner
Define who is allowed and when to trigger an action – depending on the day of the week and the time.
The cleaning lady is allowed on Fridays between 10:00 and 14:00 in building A + B.
The caretaker is allowed around the clock in all buildings.
Integrate fort knox® into your time and attendance
Left pointing finger “coming home" – Right pointing finger “leaving"
Left middle finger “service"
Let fort knox® switch
in your SmartHome, building management, automation of machines.
Switch scenes when leaving the building with the left ring finger. Open the garage door with the left index finger or activate / deactivate the alarm systems with the right ring finger etc.
Thanks to the network capability of fort knox®, there are no limits.
Tamper and what is next?
You ask yourself what happens in case of tamper?
The fort knox® finger scanner is used by an unauthorized person.
In this case, fort knox® may send a message of unauthorized use.
An unauthorized person attempts to disassemble the scanner.
In this case, fort knox® can send a message on the basis of a tamper attempt and / or trigger an alarm via the alarm system.
An unauthorized person has ripped fort knox® out of the wall and wants to penetrate the network over the network cable to hack the internal LAN.
In this case, the tampered network segment can be physically separated from the infrastructure, so that even greater damage cannot be caused by shockers.
Hacking the network is impossible.
The network segment can be unblocked again by an authorized person either by hand or via a web browser, or another, possibly your own software solution.
Prices plus shipping charge and plus tax according to the country you are located in unless otherwise stated.