Hermann-Bahlsen-Straße 11
DE 30890 Barsinghausen
Product range

Key Management Systems

Key Management Systems

Control who can have access to which keys and when
Identify, control, audit and report

Keys remain a vital part of any security solution yet their importance is often overlooked. They control access to critical areas and high value equipment. An electronic key management system can restrict which people are allowed access to individual keys, it is an access control system for keys. Knowing who, when and where they are means you are always in control and people feel more accountable meaning less lost keys. Implementing a key management system can reduce operational costs and resources by eradicating the manual issue and return of your keys.

Our modular and scalable key management systems offer intelligent control, administration, and documentation of your keys – flexibly and from anywhere. proxSafe creates the highest degree of efficiency and comfort in your everyday operations.

more about Key Management

Product range

Digital Locking Systems

Digital Locking Systems

Online and offline access control
Digital locking cylinders for a smarter door

The doorLoxx digital locking system makes it significantly easier and cost-effective to change from a conventional master-key locking system with mechanical keys to an electronic access control system. Installation is very straightforward, no doors are damaged. There is no need for time-consuming and expensive cable installation.

The digital locking components are battery operated and exchange data wirelessly. The digital locking components are available in a variety of formats, for example cylinder and Digital Handle. Our portfolio includes an updater, controller and online reader, which link the locking components to the system. Full scalability makes it possible to operate a system without PC software as equally as with Commander Connect, which offers all the performance characteristics of professional access control systems.

Digital Locking Systems

Product range

Access Control

Access Control

Proven history of secure solutions
Advanced Physical Access Control Readers and Cards

deister were an early pioneer of developing and manufacturing proximity access control cards and  readers. 30 years ago we invented the technology that allowed blank cards to be programmed on demand, we were the first to deploy card programmers to many of the access control manufacturers and one of the first companies to offer secure proximity access cards that overcame copy attacks of that time. Today, we are independent of any card technology or access control system and globally supply advanced secure readers that are capable of not only reading many different card technologies at the same time but connecting to a wide range of access control systems – The ability to reconfigure many of our readers to suit customers changing requirements provides outstanding long term value.

read more about Access Control

Product range

Personal Safety Systems

Personal Safety Systems

Personal protection systems
Easy and reliable identification with RFID

No matter if in health services, facilities with public access, public authorities or in industry, the task of protecting people is of the utmost importance, with intelligent technology required to protect areas subject to inherent risks. That also includes protecting personnel working in environments with a high potential for aggression such as in employment centres and social security offices or those employed in so-called “lone worker” positions. Based on the latest developments in wireless data transmission, amanTag systems from deister electronic are utilised in environments such as these. With amanTag it is possible to control and limit the freedom of movement of people within a building on the one hand, and localise and protect the people 

inside the building on the other. The system consists of active transponders and reader devices, so-called Locators. The active transponder carried by a person is detected by the Locator within range. Locators are not only able to detect transponders, they are also able to control doors and alarms, for example, to close off or allow access to and from different areas.

The management software is tailored to the respective applications. It offers intuitive, user-friendly operation and is equipped with interfaces to connect to other communication and information systems.

read more Personal Safety Systems

Product range

Smart Storage and Asset Management

Smart Storage and Asset Management

Intelligent asset management systems with handling automation
Automatic issue and return of valuables

Are your important assets and resources used efficiently? It‘s often all to easy too lose track of who has what item, when it is last used and especially the condition that it is returned in. proxSafe smart storage systems identify who has your essential assets by controlling who has them with full audit and reporting capabilities. Users are identified by card, pin or biometrics allowing them to only take the items that they are authorised to have, ensuring you have complete accountability of your company’s shared portable equipment. Radios, test equipment, tools, laptops and much more can now be managed automatically so you know that the equipment is ready when you need it.

more about Smart Storage

Product range

Guard Tour Management

Guard Tour Management

Security guard and plant protection
Comprehensive recording of mobile and stationary security services

dataLog is the market leading proof-of-visit and patrol verification system, that records the presence and location of security, cleaning and maintenance personnel at given locations and times.

For over 37 years deister electronic has been providing robust and reliable systems, which meet the requirements of both commercial and industrial applications.

dataLog systems allow better use of staff, improves efficiency, and provide accurate and fast audit information on work carried out.  Most importantly they highlight any checks that were missed, so that appropriate action can be taken.

The main components to a dataLog proof-of-visit system are a handheld data collector, location checkpoints and management software. Checkpoints are fixed to locations to be visited, and the worker carries a robust handheld data collector which they use to read the checkpoint when it is visited. The checkpoints identification number and time of the visit is recorded by the data collector.

dataLog systems are ideal to determine the location of security guards and other workers where security, safety, servicing or cleaning checks need to be done.  deister dataLog systems are used globally for manned guarding operations and many other applications where a mobile worker’s attendance at a given location needs to be verified.

more about Guard Tour

Product range

Long-Range Identification (AVI)

Long-Range Identification (AVI)

Identify vehicles reliably
Long-range identification made simple

The fast and reliable long-range identification solution automatically identifies both drivers and vehicles in any weather conditions. Queues in vehicle access and exit areas are a thing of the past. Ideal for car parks, traffic management and free-flowing vehicle access control (AVI). The technology is also suitable for monitoring rail traffic as well as vehicle access barriers in city centres, airports and at toll roads. Thanks to numerous interfaces it is possible to integrate tranSpeed seamlessly into other control systems – but it can also be used as a stand-alone solution. There is a wide range of transponders available; these include robust heavy-duty transponders, self-adhesive stickers for windscreens and ISO cards, which perfectly combine two reader technologies.

more about long range vehicle identification

Company profile

deister electronic is an innovative, family-owned global business. We got 40 years of experience in developing electronic and mechanical products for smart building security and industrial automation. We're widely acclaimed for our expertise and specialist implementation of RFID technology within practical applications, from key management, online and offline access control, smart cameras, guard tour systems and long-range identification (AVI) to logistics and process control.

×