Tri-Ed and ECKey Helps Transform Smartphones into Access Control Credentials

Tri-Ed, a North American independent security distributor, is pleased to welcome ECKey as a new vendor partner.

 Tri-Ed and ECKey Helps Transform Smartphones into Access Control CredentialsECKey long-range prox readers and stand-alone access control systems use Bluetooth rather than older prox card technology so users can look to their Smartphone, tablet or any other Bluetooth device to serve as their key. This eliminates the administrative burden of cards and improves security compliance as people are less likely to share their Smartphone and quickly know when it has been misplaced.

ECKey readers have adjustable read-range that works from 1’- 30’ so they can be mounted on the secure side of the door, away from vandals and the elements, saving installation and maintenance costs. They easily integrate with traditional panel access control systems using Wiegand output and have an on-board audit trail for stand-alone applications.

“We are very excited to have Tri-Ed as our national distributor to help us reach dealers who are ready to graduate from the commodity access control products they are selling today,” noted Jessica Deer, ECKey marketing and support manager. “The costs savings available with ECKey products combined with Tri-Ed’s support are a winning combination.”

"We are pleased to welcome ECKey as a valued vendor partner," added Pat Comunale, president and CEO, Tri-Ed Distribution. "Their progressive access control solutions will enhance and expand the access offerings we provide to our customer base."

Featured

  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

  • ISC West Announces 2023 Keynote Series Speaker Lineup

    The International Security Conference (ISC), in collaboration with premier sponsor Security Industry Association (SIA), announced five of this year’s ISC West Keynote Series speakers. ISC West will kick off its annual conference on March 28 (SIA Education@ISC: March 28-30 | Exhibit Hall: March 29-31) at the Venetian Expo in Las Vegas, Nevada. Read Now

    • ISC West
  • Accelerating Security Modernization

    In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes. Read Now

Featured Cybersecurity

New Products

  • Dinkle DKU Barrier Terminal Blocks

    Dinkle DKU Barrier Terminal Blocks

    New DKU screw type terminal blocks use a spring-guided system where the screws are integrated and captive within the terminal enclosure. These screws can be backed out so that ring- or U-shaped cable lugs can be inserted, without the possibility of losing the screw. 3

  • Pivot3 Surety

    Pivot3 Surety

    Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3

  • Paxton10 CORE Cameras

    Paxton10 CORE Cameras

    The new CORE Series cameras feature edge processing for ultimate scalability, built-in edge storage, and plug-and-play installation. The addition of the CORE Series gives installers new hardware, better choice, and more value than ever before. 3