Encrypted, vandal-proof card readers

The most advanced encryption protocols protect the data during all communication between the controller, the reader and the card.

  • Encrypted communication (AES128)
  • Vandal-proof design (IK10)
  • Outdoor use (IP65)
 Card reader hero
Reference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner companyReference logo for a partner company
Representation image for Predor–STid integration
Hex visual

Predor–STid integration

The Predor system was among the first in Europe to achieve deep integration with STid readers. The STid SSCP (Smart & Secure Communication Protocol) and AES128 encryption protect data end-to-end – from the card to the server, ensuring unreadable and non-replayable communication.

Representation image for Vandal-proof,
industrial design
Hex visual

Vandal-proof, industrial design

STid readers operate reliably even under extreme environmental conditions. The IK10 impact-resistant, vandal-proof design, modular expandability, and modern design make them ideal for office buildings, factories, and high-security facilities alike.

Representation image for STid Mobile ID – digital cards
Hex visual

STid Mobile ID – digital cards

With STid Mobile ID, your mobile phone becomes a fully functional access card. The digital ID communicates with the reader over an encrypted channel (NFC/BLE), ensuring secure, fast and contactless access. No more lost cards – permissions can be activated or revoked remotely.

Representation image for NIS2-compliant security
Hex visual

NIS2-compliant security

The Predor–STid system uses end-to-end encrypted communication (SSCP + AES128), preventing eavesdropping and replay attacks. The access management, logging, and central configuration support NIS2-compliant auditability and controlled operation. The readers can be encrypted from the Predor software.

Get in touch with our team to receive a customized quote for your business

Call to visual purple background