ProdataKey

PDK IO Access Control Software

PDK.IO Access Control Software

ProdataKey now allows for "custom fields" within the interface of its pdk.io software. Custom fields increase PDK's solutions' overall functionality by allowing administrators to include a wide range of pertinent data associated with each user. Address, location, floor, unit number or any other field can be added to the pdk.io user database, providing more ways to identify employees and tenants accurately and categorize them into meaningful segments.

Custom fields give administrators greater latitude in defining user groups and customizing their permissions based on shared characteristics. For example, by identifying users by "shift," night workers can be limited to specific building entrances that are well lit and guarded. Identifying tenants by "floor" can allow elevator and stairwell permissions to be set accordingly. Custom fields also expand the functionality of third-party integrations that rely on data that are not part of a typical access-control user database. Custom fields may be applied to any pdk system directly from pdk.io.

“Applications for access control are expanding, and systems deployed in these new environments often benefit from descriptive fields that have not traditionally been part of a conventional access control user profile. With custom fields, pdk system administrators now have unlimited flexibility to incorporate data that is relevant to their specific users and applications,” said Jeff Perri, ProdataKey's founder and chief marketing officer.


    Featured

    • Until We Meet Again

      A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

      • ISC West
    • Cyber Hygiene: What it Looks Like for IoT Devices

      Cyber Hygiene: What it Looks Like for IoT Devices

      For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

    • ISC West Announces 2023 Keynote Series Speaker Lineup

      The International Security Conference (ISC), in collaboration with premier sponsor Security Industry Association (SIA), announced five of this year’s ISC West Keynote Series speakers. ISC West will kick off its annual conference on March 28 (SIA Education@ISC: March 28-30 | Exhibit Hall: March 29-31) at the Venetian Expo in Las Vegas, Nevada. Read Now

      • ISC West
    • Accelerating Security Modernization

      In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes. Read Now

    New Products

    • Dinkle DKU Barrier Terminal Blocks

      Dinkle DKU Barrier Terminal Blocks

      New DKU screw type terminal blocks use a spring-guided system where the screws are integrated and captive within the terminal enclosure. These screws can be backed out so that ring- or U-shaped cable lugs can be inserted, without the possibility of losing the screw. 3

    • Pivot3 Surety

      Pivot3 Surety

      Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3

    • Paxton10 CORE Cameras

      Paxton10 CORE Cameras

      The new CORE Series cameras feature edge processing for ultimate scalability, built-in edge storage, and plug-and-play installation. The addition of the CORE Series gives installers new hardware, better choice, and more value than ever before. 3