Review Created:
September 27, 2017
Stanley access control pricing

Stanley Physical Access Control (PAC) Features

  • PAC Access Softwar
  • Door controllers include power for locks and readers
  • Compatible with proximity cards
  • Proximity card enrollment readers
  • PAC Access Software supports 250 access points and 25,000 user
  • Integrates with Stanley Commercial Hardware

Stanley Access Control Markets

  • K-12 Educatio
  • Higher Education
  • Retail
  • Healthcare
  • Financial
  • Government
  • Global Commercial

Last updated February 27, 2017. Please visit the official site for the most up-to-date information.

With Kisi Access Control You Also Get

Looking for an alternative?

Kisi's Cloud Based Physical Access Control System operates purely in the cloud, making it easy to set up and highly scalable as you expand.

Admins are able to easily establish granular controls with group, user and time-based restrictions -- just to name a few. End users have a range of unlocking options, including mobile apps available on Android and iOS, key cards and fobs.

Stanley Physical Access Control provides a full out-of-the box access kit that can grow with your business. The Stanley PAC Access Control Starter Kit includes PAC access software, a two-door controller, 2 ONEPROX GS2 MT Mullion Readers, 20 proximity cards, and a USB enrollment reader for activating cards. Cards and fobs that use this type of Card Serial Number (CSN) technology are susceptible to being copied and used for break-ins.

Using the Starter Kit you can control up to 250 doors with 25,000 cardholders. The system card readers require connection to the door panel unlike most modern providers. This type of wiring and installation is difficult to maintain and inefficient. Stanley’s flagship reader is EyeLock which is iris detection and authentication technology. The PAC Access software is managed locally at a workstation and allows for auditing and reporting by the administrator.

Stanley is known for it’s doors and locks, and this access control system integrates seamlessly with those complementary products. The primary downfall of this particular system is the weak credential technology. Protocols are far behind what others in the industry use for authentication encryption.

Join an Access Control Technology Webinar

Understand the basics of access control systems, how cloud access control works and what benefits those systems can provide to the modern business

Join Technology Webinar