Your security is our priority
Your access system's security ultimately depends heavily on what technology you choose. That is why Idesco products are based on the most modern, secure access control technologies. Today's integrators and security managers want more security than the Wiegand data protocol and UID technologies can provide. Wiegand won't support encryption, and older, plain UID card technologies provide little or no protection from hacking and cloning. Gratefully, secure options like DESFire and OSDP are available.
DESFire readers, cards
MIFARE® DESFire balances security, sourcing, cost, flexibility and standardization with security keys to make reading or cloning impossible by hackers. DESFIRE mutual authentication and encryption ensures only your authorized devices will read your tags. It doesn't just simplify migration out of legacy Classic; since it's an open standard, it also simplifies sourcing, in contrast with proprietary products. We make Idesco DESFire readers tough enough to thrive in harsh environs, without sacrificing elegance or flexible adaptability to widely different systems. We will not only code your cards but responsibly manage your security keys, with on time delivery to your site.
OSDP-secured data transfer
Wiegand data traveling unprotected from readers was the risk that OSDP (Open Supervised Device Protocol) was organized to solve. OSDP's latest version (2.1.7) secures bi-directional data streams with effectively unbreakable 128-bit AES encryption. While Idesco makes different OSDP access readers you can choose from, our 8 CD 2.0 D reader can show personalized messages to users on its display - securely and confidentially. Our OSDP readers also support file transfer, letting you conveniently update reader configurations and firmware from your system. Lastly, since OSDP is an open protocol, numerous manufacturers support it, ensuring adequate sourcing when you decide to expand your system.
Transparent readers are a uniquely clever high security solution. Simplicity is their strength: they contain no data because your system controls all data and software. Just like hacking a loudspeaker won't let you change the music, transparent readers have nothing to manipulate. As a result, your system totally controls a transparent reader's functionality. System updates are also simplified. Since all code is system-based, device updates aren't needed, even after major changes. France's security authority, ANSSI (Agence nationale de la sécurité des systèmes d’information), prescribes transparent readers for its highest security sites. Idesco transparent reader, 9 CD 2.0 Slim Pin T, is ANSSI Level 1 Architecture-compliant.
Secure access control products
Download our guide: How to choose an RFID reader
Latest product news
As summer approaches, remember to send your orders to email@example.com and support requests via firstname.lastname@example.org.