Reader configuration

Home > Solutions > Reader configuration

Security from end to end is our watchword, as we work closely with the manufacturers of access control readers.

This allows us to integrate the creation and management of readers configuration directly maps into our encoding solution without disclosing the secret keys to a third party.

ISLOG added values

Our Relational. Software publisher, we work with all market participants and thus enable our customers to have a certain degree of independence from the manufacturers themselves.

Contact us



RFID Observatory

06 February

Security of industrial information systems, such as SCADA, ICS or GPAO, is a growing industrial challenge since the machine interconnectivity and the emergence of targeted attacks. These systems powerful in their profession, remains fragile. Their omnipresence in all industries such as production, food or energy has led states to consider this weakness as a national […]

Read more

02 September

Easily encode RFID cards and NFC tags through your web browser or using your smartphone in a blink! Simply go to http://rfid.onl and start your secure MIFARE® DESFire® EV1 encoding right now. No installation required, any authorized workstation can become a card production unit in a few seconds. No delay; if you already have your […]

Read more

18 August

The physical security industry has a long history of making do with proprietary systems. This has led to today’s challenges of dealing with incompatible legacy systems, wasted investments and great difficulties anticipating future security requirements. The Open Security Standard (OSS) Association strongly believes that the way forward, and the only way to guarantee on going […]

Read more