Assa Wireless Access Control Card Reader Examined 2014

By Brian Rhodes, Published Apr 24, 2014, 12:00am EDT (Info+)

Most card readers are hardwired to a controller, but not this unit. It claims to be as easy to install as a sticker. Even better: they say it works with almost every credential type out there. So what are the downsides? Are wireless readers the next big thing in access? 

We examine the Securitron R100 reader's features, prices, and competitive strengths and weaknesses compared to traditional wired readers.

R100 *********

************* **** ********* * ******* **** ** *** have: ** ******** ** ***** ** connectivity *******. *** ******* ********, **** *** glass ***** ***** *****, ****** ***** and **** ******** ***** *** ******** screws ** * **** ************ ***** with ** **** ********. 

*** *** ****, *** ****** ****** to *** ******* **** ********, *** internal ********* ******* *****, *** ** is ********** ********* ** ***********.

Key ********

*** *** & **.** *** ******:*** *** ********* ***** ******** ****** contactless *********** **** **** ** ** EM ****, ***** *** **** ********* model supports ******, ******** **** * *****, ******/**********, *******, *** **** ***.

*********:***** ********** *********** *********** ** *** key ** ****** *****, *** **** uses ****** *** ********** ******* ****** and ********. ******* ******* ******* ********* ******** ******** *********** ****** ** *** **********, practical ******** *** ****** *********** *** would **** **** **** **** ****** criminals *** ******* ** ***** **** other ******* ** ***** *** ****** easier.

**' (***) *****: *** **** ****** * ****** 50' ***** ***** *** ******* ****** is ****** ****** ** **** ******* two *****. ***** **** **** *********** are ******* ****** **' ** *** door, **** ***** ** ****** ********** for **** ************.

*** *******/****** *****: ******* *** ****** ** ********* on ******* *****, **** *** **** runs *** ** ***** * ****** the ********* ********. *** *** ** ***** to **** '*** *******' ****** ** the ****** ****** ****** ***** *** tamper ***** ** ********* *******. *** back ** *** ****** **** ******** an ******* ****** ****** **** ****** in *** **** *** ** ******* off *** ******** *******.

*** **********:*** **** ** ******* ****** **** an ****** ******** ******** ***. *** hub ** ***** ** *** ********** like * ******,*** **** ******* ********, ** ** essentially ** ***** **** * ******* reader. **** ********* ***** ******* ************:

*** ***.**:***** *** **** '********' ** ********** **** to **** ***.**/*/*/*, *** **** **** a ********* ******** ******* *****.**.*, ***** ** ******* ** ********* ****** *.* *** ******** ******* *** **** ********** ********. 

*****

****** ****** (***/**** *********) ** ********* at ***** ***** ** $*** ***.  *******, ****** ******* ** ~$*** and ** ********* ******* ************.

*********

***** ******** ****** ********** *** ***** installs, **** ***** ***** ******-** ******** ***** ************, *** **** **** **** *********:

  • ******:** $***, *** **** ** ************ more ********* **** ******* ***** ************. Considering ******* **** ****** *** **** ~$***, ********** *** ****** * ******* that ** **** ****** **** **** they **** ** ******** *********** ****** readers. 
  • *** **********:* ********* *********** ** *** **** of ******* ****** *** *** ******. While ***** *** *********** ******** (** to +**** [-** ** +***]), *** unit **** ** ********* ***** ** cannot ** ********* ** *****. **** limits ******* *** ** ********* ********* by ** ********* ** ******** **** could *********** *** ********** **** ** needed ** * *********** *****.
  • ******* *******:***  ******* **** **** * ****** coin **** ** *** ******* *******. ***** the ******* ****** **** **,*** ****** with ****** ***, **** ***** ******** be **** ***** * **** *** doors ****** * - ** ***** per **** ****** ****** ******** *****. The *********** **** ** ***** ********* and *** ***** ** ******* **** will ** **** **** *** ******* wired ******.

***********

** *** ** ***** ************ ***** are ****** ** **** * ***** reader (**** ********* ******** ** ** hour ** ****), ** *** ********** ******* is *****, ******, ** *****, *** R100 ** *********** * **** ***.  *******, traditional ***** ******* *** **** ********* and ********* ******* ******* *********** **** *********, a ***** *** ******** **** ****** make.

Comments (2)

Interesting product, I can see this being something to have in your bag of tricks to solve specific installation challenges at a given door, but probably not as the primary solution for every door.

As for the security of the communication, I agree that the goal is to make it difficult enough to deter. Social engineering is a far bigger concern than someone cracking encryption.

Wi-Fi technology vs Wireless - so many people get the terminologies confused. I still do and I deal with it on a daily basis.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts reporting, tutorials and software funded by subscriber's payments enabling us to offer the most independent, accurate and in-depth information.
Loading Related Reports