Review Created:
September 27, 2017
Stanley access control pricing

Stanley Physical Access Control (PAC) Features

  • PAC Access Softwar
  • Door controllers include power for locks and readers
  • Compatible with proximity cards
  • Proximity card enrollment readers
  • PAC Access Software supports 250 access points and 25,000 user
  • Integrates with Stanley Commercial Hardware

Stanley Access Control Markets

  • K-12 Educatio
  • Higher Education
  • Retail
  • Healthcare
  • Financial
  • Government
  • Global Commercial

Last updated February 27, 2017. Please visit the official site for the most up-to-date information.

With Kisi Access Control You Also Get

Out-of-the-box integrations with the most popular Active Directory services such as Microsoft Azure AD or Google Apps.

Kisi Reader
Custom Pricing , Tailored to your Business

Experience our subsidized pricing plans , customized just for business needs

Stanley Physical Access Control provides a full out-of-the box access kit that can grow with your business. The Stanley PAC Access Control Starter Kit includes PAC access software, a two-door controller, 2 ONEPROX GS2 MT Mullion Readers, 20 proximity cards, and a USB enrollment reader for activating cards. Cards and fobs that use this type of Card Serial Number (CSN) technology are susceptible to being copied and used for break-ins.

Using the Starter Kit you can control up to 250 doors with 25,000 cardholders. The system card readers require connection to the door panel unlike most modern providers. This type of wiring and installation is difficult to maintain and inefficient. Stanley’s flagship reader is EyeLock which is iris detection and authentication technology. The PAC Access software is managed locally at a workstation and allows for auditing and reporting by the administrator.

Stanley is known for it’s doors and locks, and this access control system integrates seamlessly with those complementary products. The primary downfall of this particular system is the weak credential technology. Protocols are far behind what others in the industry use for authentication encryption.