Traka RFID Lockers

Product Profile

Successfully track multiple users and locations instantly with Traka's RFID locker system. Through secure storage and unique RFID tagging capabilities, organizations can strategically manage and control various equipment and important assets.

The system simply requires the user to identify oneself by entering a 4-digit PIN, swiping a company magnetic ID card or using their fingerprint if the biometrics reader access is specified. The software will verify the user’s identity and permit access to the lockers and its contents accordingly.

Keeping all the data centralized, Traka’s RFID system runs through an ‘advanced locker administration mode,’ which can be controlled from one networked server.

In addition to advanced recalibration settings, automatic door features and text and email options for activity notifications, Traka’s lockers can also encompass the following problem-solving abilities:

  • Control and restrict user access to each specific device based on a skill level or need-to-have basis
  • Automatic lock-in for equipment that needs to maintained or updated
  • Ensure that housed devices have had adequate time to recharge since previous use
  • Issue devices on a last-in, last-out basis
  • Determine liability when equipment is returned by someone other than the person of original point of access
  • Capabilities to raise an alert on any item which is not returned on time and automatically send notification to appropriate supervisor
Read more

Technical Specification

Make Traka
Manufacturer Traka
Category Access Control>Access control systems & kits
Model code RFID Lockers
Standalone/ Networked/ PC PC-based
c/w Cards, Tags or Fobs Cards
Additional info Traka Ltd RFID Lockers use Traka software. They are run in 'advanced locker administration' mode and are controlled from a local Windows PC or run centrally from a networked server. Each device is uniquely RFID tagged  so that it is managed, controlled and individually accounted through the Traka software. RFID lockers ensure secure storage so that only authorized, competent and trained staff can gain access to specific assets, partly for security and compliance reasons, but most importantly for control purposes.
Download PDF version Download PDF version

Related white papers

Effective Asset Management In Airports

The Critical Role of Access Control in K-12 School Security

The Benefits of Edge AI + Cloud For Security Systems

$common_vars['trending_topic_article_popup'][0]->title

Gallagher Brings Employee Badge In Apple Wallet To Customers Via Gallagher Command Center