Access control systems
by Synel Industries

Access control systems provide comprehensive Access Control management, including hardware and software solutions with biometric fingerprint verification and identification.

Synel's Access Control systems are adaptable and can be fully upgraded to meet changing requirements.

Wherever you want maximum security, employ a sophisticated, PC-configurable Access Control system by Synel. And whether you need to monitor a single room or multiple facilities, Synel has an Access Control System to meet your needs.

PC Based Systems

Falcon and Falcon PRO (Download PDF)

A comprehensive access control management software

This access control software is a powerful tool, enabling complete access control over both your employees and workplace. It enables you to limit access to any work area; to see - in real time - the exact location of any individual; and to produce custom reports on location and movement of all persons for security purposes. 

  • Reports all transactions on-line
  • Operates under Windows 95/98/NT/2000
  • Multi-user/Multi-tasking
  • Unlimited access security groups and time zones
  • Generates complete user-defined reports
  • Relates picture to card holder
  • Combines CCTV management and operation (Falcon i)
  • Includes personalized ID card printing module (optional)
  • Indicates events on a graphic map of any secured area

SY-400/A (Download PDF)

An access controller for control of up to two doors, gates or other barriers.

SY-400/A design particularly emphasizes on external devices fast-connection, such as readers, I/O, communication. This mode of connection without product disassembly is provided for quick and simple maintenance purposes.

  • Two connectors for badge readers (PRX-30,SY-10/M,SY-10/B, reader unit) 
  • Connector for PRintX 
  • Connector for programming display panel 
  • Two relays for bell, door, etc... 
  • Two sensors for door monitoring 
  • Large storage capacity 512K of protected RAM 
  • Reliability - Protected real-time date/time clock 
  • Backup battery for the memory and real-time clock 
  • RS-232 and RS-485 communication 
  • Variable baud rate - 1200 to 19200 bps

PRX-30/3A - Proximity Readers (Download PDF)

PRX 30: combine proximity with a keypad

PRX 3A: a flexible reader with a simple design

  • Emulation of magnetic stripe or bar code output for easy connection to terminals 
  • Reliable, attractive and compact design 
  • 10 cm reading distance 
  • Perfect for locations with limited access or where space is at a premium

PRintX - Biometric Fingerprint Reader (Download PDF)

Personal recognition for the highest security level

By providing positive personal verification, PRintX is the ideal access control reader for maximum security requirements.

  • Up to 4,000 fingerprint templates 
  • Template verification in less than one second 
  • Compact design for locations with limited access or where space is at a premium 
  • Operates in conjunction with SY-400 
  • Less than 0.001% false acceptance or false rejection 
  • Five security level verifications

Stand-Alone Systems

PRX-40 (Download PDF)

Mini Proximity Access Control

Combining proximity with a keypad as a stand-alone unit

  • Allows access to hundreds of users
    Four operating modes:
    - Card only
    - Card & PIN
    - Card followed by second card
    - Card & global code
  • Reliable, attractive and compact design
  • Perfect for locations with limited access or where space is at a premium 
  • Internal relay for door-latch activation 
  • Set up and control directly from the keyboard

PRintX-40VE/ID - Biometric Fingerprint Reader (Downolad PDF)

Personal recognition for the highest security level

By providing positive personal verification, PRintX is the ideal access control reader for maximum security requirements.

  • Up to 4,000 fingerprint templates 
  • Template verification in less than one second 
  • Compact design for locations with limited access or where space is at a premium 
  • Operates in conjunction with PRX-40
  • Less than 0.001% false acceptance or false rejection 
  • Five security level verifications