ProdataKey, Inc.

Mobile First Access Control

CONTACT INFO
67 W. 13490 S. Suite 300
Draper, UT 84020
Toll Free: 801-317-8802
Phone:
Request for information ProdataKey, Inc. Contact Us / RFI
CONTENT
CSI specifications / specs
Videos
Catalogs / Brochures
Datasheets
Webinars
press releases
SOCIAL
COMPANY OVERVIEW

Our mobile-first platform was founded on the principle of simplicity without compromise. We engineered an entirely cloud-based access control platform that's easily configured and managed from any mobile device. Our cloud service is the cornerstone of our mission: to empower our partners through exceptional support and intuitive, secure solutions.


ProdataKey has quickly positioned itself as a leader and innovator of mobile-first access control solutions being recognized as one of the top 100 fastest growing companies by Mountain West Capital Network. 


ALL PRODUCTS

Head End  

The Cloud Node  is the main system panel and is the gateway to the pdk io cloud platform. Each site requires one Cloud Node with an Internet connection. The Cloud Node then communicates with all local door controllers while storing all data on site in case of an internet outage. With the pdk io API, the Cloud Node becomes a fully integrated access  control solution.

ProdataKey Red™ products lead the industry in secure communication protocols. This includes OSDP, mobile, and encrypted credential communication.

In addition to connecting to our cloud platform, the cloud node doubles as a single door controller. It's the only device you need for a single door install.

xperience future-proof access control that's always secure, and up-to-date features, and security enhancements become available.

  • RCNE - Ethernet Enabled

  • RCNEW - Ethernet + Wireless Enabled

  • RSVR - Server Edition

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

Controllers  

Pdk's Red™ 1 controller includes built-in Ethernet connectivity and self-discovery, simplifying IP configuration and functionality. The Red 1 is equipped with OSDP functionality, an onboard power supply, and a fully supervised power circuit that monitors input, output, battery voltage, and overall controller health

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

Pdk's Red™ 2 controller includes built-in Ethernet connectivity and self-discovery, simplifying IP configuration and functionality. The Red 2 is equipped with OSDP functionality, an onboard power supply, and a fully supervised power circuit that monitors input, output, battery voltage, and overall controller health.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

Pdk's Red™ 4 controller includes built-in Ethernet connectivity and self-discovery, simplifying IP configuration and functionality. The Red 4 is equipped with OSDP functionality, an onboard power supply, and a fully supervised power circuit that monitors input, output, battery voltage, and overall controller health.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

Pdk's Red™ 8 controller includes built-in Ethernet connectivity and self-discovery, simplifying IP configuration and functionality. The Red 8 is equipped with OSDP functionality, an onboard Altronix power supply, and a fully supervised power circuit that monitors input, output, battery voltage, and overall controller health.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

The Red Max is truly in a class of its own, coming fully equipped with two power supplies and two four-door boards. Completely customize your system with any Red expansion board and scale up to 24 doors.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

Pdk's Red™ Gate Outdoor Controller includes built-in Ethernet connectivity and self-discovery, simplifying IP configuration and functionality. Additional plug-and-play connection options are available by simply purchasing a Red PoE++ Module Kit. The Red Gate is equipped with OSDP functionality.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

The solution for access control needs in outdoor applications such as parking lots, gated communities, and storage facilities. The Red Pedestal comes fully equipped with controller health monitoring, OSDP functionality, weatherproof stainless-steel housing with the ability to mount your favorite reader directly to the enclosure.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

The eight io controller will handle eight individual doors or ten elevator floors. Add the eight-door expander to control up to sixteen doors or twenty elevatorfloors out of one 12x12 enclosure. Whether you are controlling doors or elevators, you won't find a more compact, efficient, and easier-to-use door controller on the market.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

The eight io+ controller features a built-in power supply, built to handle eight individual doors or ten elevator floors in a single 14x16 enclosure. Add the eight-door expander to control up to sixteen doors or twenty elevator floors out of one enclosure. Whether you are controlling doors or elevators, you won't find a more compact, efficient, and easier-to-use door controller on the market.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

Readers  

ProdataKey's Red™ Readers are in a class of their own, with OSDP secure connectivity, high (13.56MHz) and low-frequency (125 kHz) communication, and mobile-ready options. Red Readers are now one of the most secure and versatile readers on the market today, handling every application, from your daily install to the most secure implementation.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

The all-new touch io Bluetooth reader enhances user experience while upholding the highest level of security. Using a mobile device as a credential, touch io allows users to keep their phone in their pocket for hassle-free entry.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS

Perfect for indoor/outdoor applications, allowing users to access secure areas using proximity credentials or PIN. Add extra security with two-factor authentication on keypad readers, requiring users to provide credentials and PIN to gain access.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

Enjoy the flexibility of using traditional readers that fit any application. The mullion style reader is ideal for door frame applications, or use the single gang reader for wall-mounting applications. 

  • RDRM - Mullion Reader

  • RDRG - Single-Gang Reader

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

The Push Button Reader equipped with a rugged backlit keypad, weatherproof design, and a durable zinc alloy casing, is built for applications where durability is key. The Push Button Reader offers the ability to unlock doors with proximity credentials, PIN, or the flexibility to configure two-layer security by requiring users to present a credential and enter a PIN to gain access.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

The QR Reader is equipped with a rugged, backlit keypad and is designed to withstand severe weather conditions. Built for applications that integrate QR and bar-code scanning.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

This heavy-duty, vandal-proof reader is a perfect balance between beauty and brawn. With its sleek and rugged design, the HD Reader is ideal for any outdoor facility or modern indoor office space.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS

The Keypad Reader is perfect for either indoor or outdoor applications and offers users the option of everyday proximity credentials or PIN numbers to gain access to secure areas. Flexibility is what makes this reader key.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

Credentials  

The touch mobile app allows you to use your smart device to remotely access any door you've been granted access to through pdk.io. You can remotely open (unlock) doors from the app, using your smart device, anywhere an internet connection is available.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS

The ProdataKey Red™ Key Fobs and Printable Cards are High-Security smart credentials (13.56 MHz) with a low profile and durable design. PDK Red™ products lead the industry in secure mobile, and encrypted credential communication protocols.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

The Key Fob credential is designed for professional access control systems and built to withstand years of use. This pocket-sized device is compatible with many brands of card readers, including HID, and easily attaches to a key ring, badge clip, or lanyard.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

The Leather Fob credential is designed for professional access control systems  as a discreet credential solution for users. This pocket-sized device is compatible with many brands of card readers, including HID, and easily attaches to a key ring, badge clip, or lanyard.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

The Clamshell Card is designed for professional access control systems and built to withstand years of use. With its durable white PVC construction and ergonomic design, the Clamshell Card is the perfect fit for office buildings, schools & universities, and more.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

The Printable Card offers prox card technology with a graphics quality surface for use with direct image printers. With its ultra-thin design, the Printable Card easily fits into any wallet or ID Badge sleeve.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

Place this sticker fob on any portable device or object to create your own credential. Eliminate the need for prox cards or key fobs with this discreet adhesive coil. Using RFID technology, this credential offers 26-bit Wiegand protocol and proximity scanning, providing secure, easy, and convenient access.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS

The wrist band credential is made for the active user where convenience is a must. These credentials are waterproof, feature 26-bit Wiegand communication protocol, and proximity capabilities allow use with any non-proprietary card readers.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS

Peripherals  

Extend the WiMACTM wireless signal by connecting this gateway anywhere on the local network. When connected, the pro wireless - ethernet gateway will coordinate connected wireless door controllers and feed the data

back to the cloud node via a network. The ethernet gateway also gives you the ability to control doors in multiple buildings connected to the same network.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

The REX sensor is specifically designed for indoor Request-To-Exit applications and features a passive infrared sensor with qualified motion analysis. The sensitivity of the REX

sensor can be easily adjusted for long or short-range applications and features an adjustable time delay. Because of its sleek design, the REX sensor can be easily mounted to any frame, header wall, or ceiling.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

Repeaters can be used to increase the distance of the wireless signal in areas where signal strength is weak, or the signal needs to travel long distances between door

controllers. Repeaters become part of the mesh network and connect with each other or directly to an ACP, door controllers, and cloud node.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

Power up the cloud node or single io in areas where high voltage power is available. The hv converter accepts 90- 264VAC and converts it to 12VDC at 2a. It's perfect for interfacing with the nearest high voltage source and

eliminating the need to run a power wire to controllers.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

The purpose of the Range Test Kit is to test the signal strength of your wireless devices for best placement of those devices in order to optimize their performance. Conducting a wireless range test prior to installation will show where signal strength thrives or falls short, resulting in a better installation.

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS

Integrations  

Pdk io provides greater opportunities for third-party integration. Pdk's open API allows customers to integrate their access control system with many other third-party platforms.

  • Video Surveillance

  • Intercom Systems

  • Visitor Management

  • Power Consolidation

  • Pedestal Mounts

  • Job Site Survey

Rated 5 based on 1 product reviews
SPECS CATALOGS VIDEOS DATASHEETS

Case Studies  

Minnesota Hillel is a Jewish student organization at the University of Minnesota that offers a variety of programs and activities that are designed to provide students with a sense of community, help them connect with their heritage, and encourage them to explore their identity. In addition to providing a space for Jewish students to connect with one another, Minnesota Hillel also works to build bridges between the Jewish community and the broader campus community. The organization hosts interfaith events and partnerships with other student organizations to promote dialogue and understanding between different groups.

Rated 5 based on 1 product reviews

As legalized medical and recreational use of marijuana spreads from state to state, the security industry has profited from sales that have been both COVID-proof and recession-proof. U.S. cannabis sales are predicted to reach $26.5 billion this year (2022) and double by 2030.

Rated 5 based on 1 product reviews

Vail Christian High School (VCHS) is Colorado’s top private Christian school, offering the best college preparatory program within Colorado’s vast mountain region. About 160 fortunate students in grades 9-12 learn, play, and pray in state-of-the-art facilities on a scenic, sprawling campus.

Rated 5 based on 1 product reviews

Fairbourne Station is a new, 40-acre, mixed-use development in West Valley City, Utah, that combines residential units, retail space, a hotel, and Fairbourne Office Tower, a nine-story commercial building with an adjacent parking structure. This office tower is also the new headquarters for Wasatch Property Management (WPM), the residential division of Wasatch Commercial Management (WCM), which happens to be one of the premiere, commercial real-estate developers in the Mountain West.

Rated 5 based on 1 product reviews

The owners of one of America’s fastest-growing multi-level-marketing companies recently sought the guidance of Blue Cable Networx, of St. George Utah, to strategize the security plan for their new corporate headquarters. The company employs over 300,000 consultants in the U.S. who sell affordable jewelry accessories at home parties as well as online.

Rated 5 based on 1 product reviews

The school was looking to expand their system by connecting both buildings to a singular access control system which could be managed from any location.

Rated 5 based on 1 product reviews

Pdk’s equipment and controllers are available in a variety of sorts and communication types. This allows ACES to easily incorporate access control for every tenant’s doorways, the stairwell entrances, elevator car and floor triggers, and the gates located in the parking facility.

Rated 5 based on 1 product reviews

Residential property managers know that making everyone happy is never easy. When it comes to finding appropriate management technologies, the route can be clogged with the diverse needs of stakeholders, including maintenance, communication, collaboration, governance, finances and administrative efficiency. However, some needs—security, for example—cannot be left unattended.

Rated 5 based on 1 product reviews

NVE Technologies, Inc. was approached by the high-end residential complex to assist with an existing, and non-functional, access control system. The existing system was a locally hosted system, which needed an onsite computer and server to run. After the head-end unit crashed and failed, the complex found that no system backup was in place. That’s when NVE Technologies suggested a cloud-based access control system by prodatakey (pdk).


Rated 5 based on 1 product reviews

According to the Population Reference Bureau, there are an estimated 46 million Americans above the age of 65. These retirees are looking for secure and safe environments in which to spend their golden years. One of these is Cary, North Carolina’s Glenaire Retirement Community — a truly beautiful property located near the Research Triangle Park area, close to Raleigh, Durham, and Chapel Hill. Glenaire is green, lush, well-tended, and full of amenities — it’s like a friendly village created for the well-being and happiness of seniors.

Rated 5 based on 1 product reviews

When a high school actually wears out lock mechanisms while trying to keep its students safe, it’s definitely time for a cloud-based wireless upgrade.

o protect Corning (Arkansas) High School students from intruders, all classroom doors were kept locked and the teachers opened and relocked them as needed. Principal Jennifer Woolard says, “You would be surprised how many times a key was used in each door throughout the day. It was unbelievable.” The lock mechanisms were literally worked to death.

Rated 5 based on 1 product reviews

Access control systems serve many purposes, and technology partners are chosen based on their ability to deliver on specific customer needs. A few years ago, a New York-area synagogue installed a wireless, cloud-based access control system, manufactured by ProdataKey (PDK), for its ability to deliver “convenience” in this case, helping the congregation’s vice president of operations manage and automate the complex schedule of locking and unlocking doors to its building. However, following the tragic attack at Pittsburgh’s Tree of Life Synagogue in late October 2018, this synagogue, as well as Jewish congregations, community centers, and day schools nationwide, are reevaluating their security protocols, including maximizing the capabilities of technology that is already in place. In this case, an access control system chosen for one set of criteria will now be called upon to deliver in many other ways. Fortunately, the PDK solution is up to the task.

Rated 5 based on 1 product reviews