Traka Touch

April 19, 2013

The Traka Touch standalone key management solution operates independently of a company’s IT system via an embedded Windows software and SQL Server database. No server is required to maintain its database. The system is managed via the full color 7-inch multi-language touchscreen on the front panel, from the initial administrative setup of users and keys to the management of day-to-day user access.

As with conventional Traka systems the Touch gives the administrator control over the access levels for each particular user. To gain access to keys, users must identify themselves using either a PIN code, swipe card or biometric recognition. LEDs indicate which keys a user can and can’t take when they access the cabinet.

The Traka Touch provides a real time audit of all key transactions and the unit’s solid state memory can store up to 250,000 events. Administrators can view a report of all key usage and search for a key that is “out of system” via the touch screen.

More Info: www.traka.com  

Request More Information

By clicking above, I acknowledge and agree to Endeavor Business Media’s Terms of Service and to Endeavor Business Media's use of my contact information to communicate with me about offerings by Endeavor, its brands, affiliates and/or third-party partners, consistent with Endeavor's Privacy Policy. In addition, I understand that my personal information will be shared with any sponsor(s) of the resource, so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them. You may unsubscribe at any time.

Automotive tools

IAAL Update: Gaining Momentum

May 2, 2024
Ed Woods talks IAAL conference in 2025, importance of new NASTF program, and growth for the association
Transponder programming equipment

New “Security Requirements” from Ford and GM

April 30, 2024
Effective with the 2020 model year, locksmiths who are not members of NASTF cannot program keys, both in “all keys lost” situations and in “add a key” situations, without obtaining...