Reader configuration

Home > Solutions > Reader configuration

Security from end to end is our watchword, as we work closely with the manufacturers of access control readers.

This allows us to integrate the creation and management of readers configuration directly maps into our encoding solution without disclosing the secret keys to a third party.

ISLOG added values

Our Relational. Software publisher, we work with all market participants and thus enable our customers to have a certain degree of independence from the manufacturers themselves.

Contact us



RFID Observatory

23 June

ISLOG presents RFID.ONL on STid stand at IFSEC London. First cards configuration creation plateform for access control readers. All through your web browser. RFID.ONL also encodes and personalizes access cards. WEB INTERFACE READER CONFIGURATION (STid Architect, HID Omnikey 5427 CK, neXus Cidron…) Customize your access control reader how you want it to behave and looks like. Define […]

Read more

06 February

Security of industrial information systems, such as SCADA, ICS or GPAO, is a growing industrial challenge since the machine interconnectivity and the emergence of targeted attacks. These systems powerful in their profession, remains fragile. Their omnipresence in all industries such as production, food or energy has led states to consider this weakness as a national […]

Read more

02 September

Easily encode RFID cards and NFC tags through your web browser or using your smartphone in a blink! Simply go to http://rfid.onl and start your secure MIFARE® DESFire® EV1 encoding right now. No installation required, any authorized workstation can become a card production unit in a few seconds. No delay; if you already have your […]

Read more