Rosslare launches BLE-ID app

August 2018 Access Control & Identity Management, Products & Solutions

Rosslare announced the launch of the Rosslare BLE ID apps. By installing the apps onto their smartphones, users can use the smartphone as a credential for access control and automation applications. The ID code generated by the app is unique to the device, and may be transferred easily by email to the system administrator.

Rosslare’s new CSN SMART readers will appear in the app and the user just needs to tap on the reader name to submit the credential to that particular reader. The main benefit of this technology is that the user is no longer obligated to carry a physical RFID card. In addition, the 10-metre operating range of the app introduces a new set of convenience factors.

The CSN SMART readers feature a multi-credential UID read technology for contactless smart cards (13.56 MHz) that can read the card serial number (CSN) of many smart card RFID standards. The readers have the ability to read Rosslare’s BLE credential technology and PIN codes, providing a cost-effective credential solution for any application.

The readers are rated IP65 and feature a modern design that can fit comfortably in any installation environment, indoors or outdoors. The app is available for download from Google Play Store and App Store.

With the new release, clients using Rosslare technology are able to secure their facility entrances and exits using personal devices as identification. This new app makes access control more cost-effective and easier for Rosslare clients everywhere.

“The creation of the BLE app evolves from our customers, who needed an alternative credential that is affordable, reliable, and their users will embrace, and can be used together or as a physical credential card,” said Ezra Ozer, director of marketing of Rosslare’s Security Products division.

For more information contact Rosslare Security Products, +852 279 55630, sales.apac@rosslaresecurity.com, www.rosslaresecurity.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Putting security in gear
Asset Management Products & Solutions
The inaugural Securex Cape Town 2025 will showcase a number of companies focused on vehicle and fleet security on South Africa’s dangerous and often crime-infested roads.

Read more...
Managing assets and clear communication
Asset Management Products & Solutions
Communication is essential for security management as well as efficient asset control. A few companies at Securex Cape Town 2025 might have the solution you are looking for.

Read more...
Drones and a hint of access control
Surveillance Products & Solutions
Drones are an indispensable tool for security operations, with more functionality and capabilities than ever. Securex Cape Town 2025 will naturally have drone service providers available to light the way for interested parties.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.