Asset tracking readers

September 2017 Asset Management, Surveillance

ZKTeco has a wide variety of access control and tracking solutions. This includes long range UHF scanning and tracking which can be used for access control, asset tracking and people tracking. These particular long range UHF readers can scan between 1 m and 12 m, depending on the scanner type and angle at which it is installed.

In combination with these scanners, a wide variety of tags are also available, which is used to tag and identify the specific asset or person being tracked or granted access to a specific area or gate. The tags come in ranges of vehicle window tags, asset tag stickers, high heat tags, vandal proof and rugged tags, people armband tags and many more different types to choose from. The tags can be epoxied to an asset, or stuck onto an asset in a sticker format, or even bound to an arm or leg of a person or animal. In the animal tracking range, we also have cattle-ear tags available, which can be used to track cattle or other forms of livestock on farms.

The long range UHF scanners communicate directly to the ZKTeco Inbio series access control panels, which would make installation onto an existing ZKTeco site effortless and speedy.

The long range UHF scanners are compatible with most Wiegand interfaced readers, as it transmits information on a tag in the Wiegand protocol to the control panel or master unit. Some integrations are mostly plug-and-play, but in more protocol and format sensitive system environments, some development for the interfacing of these scanners may be required, but this can be easily accomplished with ZKTeco’s South African team of developers.

The system is cost-effective and affordable, and can also cut costs and losses in areas like stock loss, asset loss, attendance at work or on-site, etc. Ultimately the system does not necessarily need to be an asset purchased without the chance of a return in costs spent, and if implemented correctly for the reasons of prohibiting losses, the system can return its value by cutting down on these losses respectively.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Verification is reshaping South Africa’s labour market
Security Services & Risk Management Asset Management Commercial (Industry)
Hiring faster, trusting less: in a labour market defined by both constraint and potential, the ability to hire with confidence may well become one of the most important competitive advantages.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
From false alarm filtering to intelligent decision-making
DeepAlert AI & Data Analytics Surveillance
As AI continues to evolve, the most successful surveillance operations will be those that not only reduce nuisance alerts, but also derive meaningful business intelligence from video data.

Read more...
Camera Selection Guide 2026
Camera Selection Guide Surveillance
The Camera Selection Guide 2026 features a range of cameras designed to meet a wide variety of needs and use cases for professional security operations.

Read more...
Storage Selection Guide 2026
Storage Selection Guide Surveillance
The Storage Selection Guide 2026 provides video storage and management options customised for small, medium, and large surveillance operations, ensuring effective support for various security requirements.

Read more...
Driving down fleet management costs
Asset Management Transport (Industry) Logistics (Industry)
As we move into the latter part of the first quarter of 2026, businesses operating fleets can expect expenses to increase from the procurement stage through to termination, due to various local and international factors.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.