Review Created:
June 19, 2019
Stanley access control pricing

Stanley Physical Access Control (PAC) Features

  • PAC access software
  • Door controllers include power for locks and readers
  • Compatible with proximity cards
  • Proximity card enrollment readers
  • PAC access software supports 250 access points and 25,000 users
  • Integrates with Stanley Commercial Hardware

Stanley Access Control Markets

  • K-12 Education
  • Higher Education
  • Retail
  • Healthcare
  • Financial
  • Government
  • Global Commercial

With Kisi Access Control You Also Get

Looking for an alternative?

Kisi's Cloud Based Physical Access Control System operates purely in the cloud, making it easy to set up and highly scalable as you expand.

Admins are able to easily establish granular controls with group, user and time-based restrictions -- just to name a few. End users have a range of unlocking options, including mobile apps available on Android and iOS, key cards and fobs.

Stanley Physical Access Control provides a full out-of-the box access kit that can grow with your business. The Stanley PAC Access Control Starter Kit includes PAC access software, a two-door controller, 2 ONEPROX GS2 MT Mullion Readers, 20 proximity cards, and a USB enrollment reader for activating cards. Cards and fobs that use this type of Card Serial Number (CSN) technology are susceptible to being copied and used for break-ins.

Using the Starter Kit you can control up to 250 doors with 25,000 cardholders. The system card readers require connection to the door panel unlike most modern providers. This type of wiring and installation is difficult to maintain and inefficient. Stanley’s flagship reader is EyeLock, which is iris detection and authentication technology. The PAC access software is managed locally at a workstation and allows for auditing and reporting by the administrator.

Stanley is known for its doors and locks, and this access control system integrates seamlessly with those complementary products. The primary downfall of this particular system is the weak credential technology. Protocols are far behind what others in the industry use for authentication encryption.

5d13e6b076837ce3e08a9ab6
template-1
box