Contactless Hygienic Security Solutions

Contactless Hygienic Security Solutions

Saflec Systems leads the way in providing security solutions to the South African market, and during the COVID-19 pandemic, it is no different. With the emphasis on social distancing and hygiene, we have contactless, biometric and facial recognition software that can easily integrate with our custom-developed software, SACS (Saflec Access Control System). Using these integrated systems, you can create a more hygienic environment for you and your staff with many benefits while you ensure a contactless environment that will mitigate the spread of harmful bacteria, viruses and pathogens. Get ahead of the trend towards touchless technology and prepare for the changing world that will surely emerge from this worldwide pandemic.

Here are a few solutions that could assist.

The MorphoWave from Idemia

This touchless scanner comes in two forms – the Desktop and the Compact Tower. The technology uses a reliable fingerprint capture with a patented, touchless 3D acquisition solution, so it’s perfect for high traffic areas, as it is quick, efficient and has the highest level of accuracy. It scans and processes four fingerprints simultaneously, with one quick hand movement over the large contactless scanning surface.

This solution is perfect for medium to large enterprises with a large staff complement that requires quick, reliable and effective access control.

Our SACS software is 100% integrated with the system.

AC-7000 Facial Recognition Scanner

This scanner uses facial recognition as well as fingerprint recognition in one terminal. The advanced face authentication algorithm can recognize faces in various lighting conditions and can match up to 10000 face templates in 1 single second. The camera automatically detects faces, which removes the need to hunch or lower your posture to reach the camera’s field of vision.

The fingerprint technology can detect false fingerprints made from various materials including rubber, silicone and gelatin. However, this will not be touchless, so we suggest disabling this feature.

The Quadcore processor ensures that technology always responds in seconds with no delay and allows for the storage capacity of 500000 fingerprints, 10000000 event logs and 20000 image logs.

Perfect for medium to large companies and SACS is fully integrated with this tech.

Our SACS software is 100% integrated with the system.

CMITech EF-45 Iris Scanner

The EF-45 Dual Iris Recognition Scanner is first in the industry to employ face display-based subject positioning. The unique algorithm uses deep learning face detection to ensure fast and smooth operation. It has an expanded capture range of 35 to 45 cm in normal mode and all image process is done internally including extraction and matching.

This product is highly cost-effective, fast and perfect for medium to large enterprises with high traffic access control areas.

We are working on integrating this system with SACS at the moment.

We are willing and able to integrate other proven security technologies with our SACS, such as Iris Scanners and Palm vein readers. Feel free to contact us on or (011) 477-4760 to schedule an appointment for shortly after lockdown.

Should you be utilizing a SACS system with fingerprint and card readers, we are willing to assist you with reverting it to card only for the time being. This way people are able to only touch their cards which minimizes contact with the fingerprint scanner.

If there is no budget for major changes it might be that the only real solution would be a cleaning station for use before and after using the biometric device. If this is the solution that your business opts for, then please ensure that you use a disinfectant that is SANS 53727/53624/51276/51650 standards compliant. Ideco sells a disinfectant that meets these standards.

MorphoWave Compact by Idemia
– Frictionless access everywhere

MorphoWave Compact by Idemia<br>– Frictionless access everywhere
MorphoWave™ Compact by IDEMIA is the newest addition to IDEMIA’s range of readers for frictionless biometric access control. This masterpiece of engineering delivers the award-winning, field-proven performance of MorphoWave™ contactless 3D fingerprint technology in a stylish and compact wall-mounted device, suitable for any location.


Convenience & Security


Users are positively identified with a simple wave of the hand. The patented touchless sensor technology scans 4 fingers in 3D, ensuring the most accurate and reliable fingerprint matching for maximum security.


High Throughput


The reader’s high speed, touchless acquisition capability allows users to remain in motion while being identified. Faster access control and time & attendance transactions reduce overall costs and increase employee productivity.


Versatile, easy deployment


IP65 rated and PoE+ powered, the compact wall-mount reader ensures that MorphoWave™ technology can be deployed at every location. MorphoWave™ Compact is already integrated with more than 25 of the industry’s leading access control systems.


Multifactor Authentication


MorphoWave™ Compact natively supports Prox, iClass, MIFARE, DESFire cards and PIN code, in addition to biometrics. It is also capable of scanning QR codes for visitor management.


The most proven touchless fingerprint technology…


MorphoWave™ touchless 3D fingerprint technology is designed for the real world.


  • Captures and matches 4 fingers on either right or left hand, in any direction
  • Immune to environmental factors (external light, dust)
  • Copes with wet and dry fingers
  • No latent prints left on scanner
  • Mitigates hygiene concerns

The award-winning MorphoWave™ technology has become the benchmark in frictionless access, securing high traffic access points in the world’s largest financial institutions, critical infrastructure facilities, universities and healthcare organizations.

Works seamlessly with MorphoWave™ Tower


MorphoWave™ Compact represents an 86% reduction in size and 93% reduction in weight compared with MorphoWave™ Tower, making it usable at every door and not only in high traffic lobbies. The two products complement each other perfectly and work seamlessly together to secure any capacity or throughput requirements, even those of the largest global organizations.

Now available in a Compact, full-featured access & time terminal


Anti-fraud features


  • Fake finger detection
  • Timed anti-passback function – prevents repeated authorizations by the same user, within a configurable time period
  • Banned/authorized user lists
  • Tamper switches
Time & Attendance functions


  • Touchscreen time clock, featuring 16 programmable function keys
  • Access time slots and holiday scheduling
  • Real-time employee notifications
  • Job code management
Flexible architecture


  • 1:N identification or multifactor authentication with Prox, iClass, MIFARE, DESFire cards and PIN code
  • Software integration options: – Thrift commands (low protocol level) – MACI component (SDK level) – MorphoManager (application level)
For real-world deployments


  • IP65 rated design – recommendation for outdoor installation: avoid direct exposure of sensor to rain (e.g., place under a canopy)
  • Multiple interfaces including TCP/IP
  • Power over Ethernet (PoE+)
  • Wi-Fi and 4G options
  • Ingenious, symmetrical opening mechanism enables easy wall-mounting and in-place maintenance
Technical Specifications


  • CPU: Nvidia ARM Cortex-A15 QuadCore 2.1GHz
  • 4.3” Wvga color capacitive touchscreen
  • loudspeaker & microphone Intercom function
  • Audio & video player
  • touchless fingerprint sensor Hand presence detection QR code scanning capability – Specifications available on demand
  • Contactless reader options: Prox, iClass, MIFARE/DESFire
  • Tamper switches
  • Internal storage capacity: 16GB Flash, 2GB RAM – 20,000 user records (2*4 fingers each) for 1:N identification, extendable to 40,000 with licenses(4) – 250,000 IDs in authorized user list – 1 Million transaction logs
  • Network/Communication: – Ethernet, RS485, RS422, USB(5) – Wi-Fi and 4G options
  • Inputs/outputs: Wiegand In & Out (customizable up to 512 bits), Door Relay, 3 GPI (including Door monitoring), 3 GPO
  • Power supply: 12 to 24 V DC (2.5A min @12V) Power over Ethernet with PoE+ switches
  • Operating conditions: Temperature: -10°C to 55°C (14°F to 131°F). Humidity: 10% to 80% (non condensing)
  • Ingress protection: IP65(2)
  • hxWxd = 250*152*216 mm (9.9*6*8.5 in.)
  • Weight: 2.2 kg (4.85 lb.)
  • EMC/Safety standards: CE, CB, FCC
  • RoHS, REACh and WEEE compliant

How can biometrics secure a return on investment?

How can biometrics secure a return on investment?



Businesses are often looking to replace outdated management or access control systems and biometric systems are evaluated as possible options. Unfortunately the cost of biometrics often used as an excuse to rather avoid them and focus on cheaper solutions. We would like to use this blog to assist in giving an alternative viewpoint and to show that spending the money on proved and reliable solutions can actually lead to major financial savings and an incredible Return on Investment (ROI). These are just a few ways that we believe that biometrics are going to save a business money.


1.Eliminating manual systems


According to the people who work in the industry, one of the most effective return on investments comes when using biometrics for time management purposes. In many instances recording of time for compliance purposes is a manual system with a punched card or a signature in a book with the time manually recorded. Manual systems are bound to come with faults, human errors or even intentional fraud.


These manual clockings then lead to another person capturing the data in another system which can compound the errors which can lead to payroll issues. Issues with payroll can cause all sorts of problems, from simple arguments to productivity decreases to even labour strikes, so should be avoided if at all possible as they can cost a company dearly.


2.Ensuring identity


When looking at time management even the use of proximity cards or using PIN codes is not much better than the manual systems. So-called ‘Buddy punching’ is a big problem where a person can be recorded as being present by a friend where they are actually not there by simply carrying their card as a favour for them.


This can also be a serious problem with safety compliance systems where an untrained person can get access to a site that requires training or induction in order for all people on site to understand safety procedures. Beyond the possible damage of expensive equipment this could also lead to legislative processes or fines from injured employees when operating in unauthorized, dangerous mechanical equipment. A single fine or court case that can be avoided by spending a little extra on biometrics is an immediate cost saving –this is one of those financial gains that can be easily missed.


Warehousing and logistics operations require serious security in this day and age as a person who can get access to a high-value storage locker can steal millions in equipment by simply stealing another person’s access card. This is not always a simple greedy person scenario anymore and rather syndicates are popping up to exploit people, processes and companies in this way. The blame then rests on the incorrect person and it can be difficult to even impossible to ever track the culprit.


Installation of a biometrics system can cut down on these losses and also might provide discounts on insurance policies that a company must take out against loss.


3.Can’t be lost or stolen


Keys are still widely used as an access control strategy, however there is no way of tracing a lost key or checking who is using the key. The primary strategy for a lost key is to make a duplicate from a stored master key – however the lost or stolen key cannot be ‘deactivated’! Every time the key is duplicated the security is further decreased. A different strategy would be to replace the lock – this would lead to large costs over the short term and is highly ineffective. With a little training and the correct equipment most locks can be picked or damaged so they no longer work – A person would be able to make a so-called ‘bump’ key like locksmiths have at home using a metal file or even a 3D printer!


Access cards or PIN codes are a significant upgrade on keys and are therefore often used on inner security areas or ‘safer’ areas. They are an upgrade however they require active support to maintain the security level – a lost card must be immediately reported and cancelled on the system. A PIN code should be regularly changed in case they are observed by unauthorized people.


A simple thing like the time spent looking for or making copies of lost keys, changing PIN codes, enabling, disabling or assigning temporary access cards can be measured in terms of lost productivity and therefore money. There are other loss scenarios that are far more damaging to companies like loss of valuable goods or Intellectual property or sabotage can occur using stolen keys.


With biometrics the problem of losing or having keys or cards stolen fall away – a properly chosen biometric is something that a person will always have with them and will positively identify the person each time.



When looking at biometrics as an investment it is very tempting to look purely at the cost of the units and decide that they are too expensive to be used which might cause a decision maker to look into cheaper or less secure options. Hopefully we have provided a few ways that decision makers could evaluate the net Return on Investment rather than the initial cost of biometrics and see different ways that the company can be saving money by putting in biometric devices over other mechanisms regardless of the initial cash outlay!

The Importance and Benefits of Biometric Readers

The Importance and Benefits of Biometric Readers

Keeping abreast with an ever evolving and ever expanding world goes hand in hand with the need to secure it.  With a world becoming more and more technology driven, companies and people need to adapt and secure their property with proper technological equipment – biometric authentication.  Known as a biometric reader, it uses the automatic identification of individuals, reading their unique behavioural and physiological characteristics such as irises, fingerprints and gaits.  This evolved, up-to-date security measure has the following benefits:


1.Accurate Identification


As opposed to more traditional forms of security, biometric authentication provides a higher and more accurate level of security. With the use of biometric readers, such as finger print and iris scanners, a unique form of identification is provided – a feature which would be very difficult to duplicate. This would mean that no one except the authorised person, would have access to whatever is being guarded.




Biometric readers provide for biometric log-ins, thereby creating a distinct and lucid audit trail by means of which someone can be connected to a particular event or action. In the event of a security breach, a person can be held accountable as one would definitely know who the responsible party is.


3.Time Saving


We are constantly reminded that time is money. Businesses especially understand this crucial concept. Security is vital, but losing time to lock 10 different locks and chains around each door so as to protect those very precious valuables, can be tedious and end up costing you. Biometric readers is quick, simple and easy to use! Not only is time not wasted on traditional methods, but extra time is saved, thereby increasing work productivity and company revenue.


4.Increased Security


This long term security solution is safe and secure and provides a more advanced degree of security in comparison with traditional security methods. As it cannot get stolen and the readers cannot be guessed or used by anyone else other than the authorised person, biometric authentication systems protect valuables whilst protecting itself.


5.Increased Convenience


Biometric authentication is a simple and convenient solution to your security needs. Passwords get forgotten, cards and ID badges get lost – a traditional security hassle that would much rather be avoided by employers and employees. Switching to biometric readers means conforming to new technology and leaving all those unnecessary nuisances behind.


6.Return on Investment


Biometric authentication doesn’t only provide an excellent and modern form of security for your costly articles, it is an investment from which you will definitely earn returns. Through the use of this updated technology, fraud, and the ‘buddy punching’ system, is avoided, and other costs such as payroll costs are lowered. Biometrics also eliminates “ghost employees” as it is able to assess fingerprints and software, and thereby recognize when duplicate fingerprints have been created.    Moreover, due to the ease of use of biometric readers, and its accuracy, productivity in the workplace is increased, management time decreased, and work hours can now be effectively calculated – all contributing factors which increase a company’s return on investment.


Biometric authentication is of great importance and has exceptional benefits in the world that we live in. Take a step towards safety; Call Saflec Systems today for your biometrics and security needs.



The Importance of access control

The Importance of access control

In a society dominated by crime, at home or at business, it has never been more important to implement measures to secure the safety of valuable belongings and loved ones. It can be argued that the simple lock and key is no longer equipped to provide this vital security. Access control is an updated and effective method of ensuring that access to a business system, certain areas of a premises or physical and virtual resources are restricted, either by an authority or a business.

There are two different types of access control: physical control, which restricts access to physical things such as buildings, campuses and rooms, and logistical access, which limits access to connections such as computer connections, data and system files. There are also different types of control practices, the most secure of which entails a two-factor authentication. Firstly, credentials must be presented by the person requiring access. Thereafter, his/her identity must be corroborated. It can be done by way of an access code, a PIN or biometric reading through a biometric reader.


Understanding the importance of access control can be extended to the following reasons:


1. Intrusion Detection and Prevention


In big companies and buildings, intruders sometimes go unnoticed rather easily, especially because they can appear in all sorts of forms: staff or visitors. It is for this reason that access control systems can come to be such an advantage to companies – it doesn’t only detect intrusion, it has the ability to prevent it and track movement in a building by monitoring who has access to that building.


2. Control who has access to your building


Access control systems can be customised to each individual’s specific needs. After optimised as such, it is possible to control who uses what doors within a business, what time of the day or which day of the week the doors are used. Customising external and internal doors as such ensures that employees or visitors are only accessing doors, rooms and areas which they require and gives a business considerable regulation over the foot flow within the building. It also works well to monitor whether employees are actually present at work at all.


3. Industrial and equipment safety


Whether at home or at a business, everyone has valuable equipment and belongings that need to be kept safely. Having access control in place can ensure exactly that, as it limits who has access to those belongings, and restricts access to certain areas of a business or residence where valuables are stored.
To companies that work with hazardous equipment, access control is crucial, since industrial accidents should be avoided at all cost. A system is required which effectively ensures that unwanted and unauthorised personnel do not have access to the premises.


4. Deterrence of Criminal Activity and Protection from theft


As a company or building owner, one is faced with the continuous struggle concerning crime. This includes vandalism, theft, burglary, and even arson – all which can be averted using the proper precautionary methods. With an access control system, it is possible to monitor who has access to a business and which areas they have access to.. Such a system can also effectively detect and prevent criminal activity. CCTV cameras can be installed, any high risk or stock areas can be restricted to authorised personnel only using the two-factor authentication control system.


5. Protection of staff


With the knowledge and control of who has access to a building, when and exactly where, employers are able to increase the safety of their employees. Providing a safe working environment is vital to the continued success of any company.


6. Electronic Visitor, History Logging And Muster Reports


With access control systems in place, it is possible to log and record every time access is granted to a property. These reports can accurately detail time and place of access for reviewing purposes if necessary or required at a later stage. For security purposes, it provides the owner of the premises with peace of mind, and the company owner has an audit trail that can be accessed electronically at any time.


7. The elimination of key problems


Securing a premises with the straight forward lock and key is well, simple and sometimes even very effective. But what happens when keys are lost or the company is running on a large scale operation? The prospective cost of replacing locks or having to cut new keys can come to be rather costly. Keys can also be risky as they have the potential to be copied. None of these issues or inconveniences come to light with an access control system. It is not only modern and state of the art, but it is also considered to be the most successful, efficient and practicable security methods.


8. Reduce Energy Bills And Protect The Environment


Access control systems don’t only allow you to protect your building, your valuables and your staff, but also your environment through the reduction of energy used in companies. As it is always aware of the areas being occupied, it is able to automatically turn off unused and therefore unnecessary lightning, thereby decreasing heat and electricity bills, saving companies a lot of money.


For securing a premises, giving staff access to certain areas thereof or merely giving employees access to the building between nine and five, access control systems can do it all. It is an updated, effective and easy way of providing the best security for loved ones and precious assets. Why risk it when it can be prevented?

The advantages of OSDP

The advantages of OSDP

The Open Supervised Device Protocol (OSDP) is a communication standard and device-to-controller protocol.

Apart from the quality interoperability that OSDP provides, OSPD has superseded the Wiegand technology and standard. Although Wiegand has served companies well in the past, it is no longer able to provide as effectively for those companies that require highly operable, secure access control systems.Moreover, OSDP has proved to have quality, highly regarded advantages that put OSDP above Wiegand.


1.OSDP prevents vendor lock-in

Previously, manufacturers would determine the identification device suitable for their system, confining the company to single vendor. Interoperability amid different security devices offers the advantage of not being confined to a single vendor effectively breaking this restraint. Companies are now able to choose any OSDP-compatible device along with an access control system that supports OSDP and can be assured that the system will work properly.


2.OSDP is easier to install

The primary function of this protocol standard is to allow security equipment like biometric, proximity or barcode readers designed by one manufacturer to be connected with the control panels and equipment from another manufacturer with relative ease.

OSDP also provides easier installation as the identification device typically transmits information to the access control system using RS-485 through a single cable pair. This provides the option for a single controller to connect to multiple devices from various manufacturers on a single pair cable!

When compared to Wiegand, which would require anything from 4 cores to as much as 6 cores on a one-to-one basis and only over short distances, this is a lot more effective for installation!


3.There is greater functionality in OSDP

Before OSDP, red and green LED lights were commonly used by the access control readers to indicate access allowed or denied. The problem, however, came about in that the cardholder was not aware why they were denied entry. OSDP provides functions where audible and visual feedback can be displayed. If capable, the device can therefore display text, flash different coloured lights, or provide different audible beep sequences as feedback to the cardholder to portray a better picture of what is happening. Functionality can now be enhanced by using OSDP to prompt the cardholder to enter a PIN or fingerprint for biometric verification.


4.OSDP has proactive monitoring and management

OSDP allows the system to proactively monitor and manage the status of devices and reports errors, like circuit tampering or devices that are disconnected. This allows the system to take control before a problem has the opportunity to become a serious situation. This feedback system helps security teams to diagnose errors quicker which translates into lower costs for the security company.


5.OSDP has increased security

In contrast to the Wiegand security systems, OSDP offers an immensely vigorous communication security that meticulously transmits data using a cyclic redundancy check which ensures that the data sent or received is accurate. When paired with the AES 128 Bit (FIPS 197 Standard) encryption algorithm the data is known to be accurate, secure and untampered with, thereby ensuring a secure channel between itself and the device to protect its data and prevent other data from being transmitted. OSDP therefore serves security systems better as it heightens security and interoperability and enhances functionality.


Wiegand was the foundation and the prototype of traditional secure access systems in the 1980s and it was good. So was the typewriter!

The fact of the matter is that security needs are ever advancing and so is the technology that complements it. OSDP is an excellent choice for companies that require highly operable, secure access control systems. Moreover, it has an abundance of advantages that help security, access control systems and companies move forward.

Saflec Systems is ensuring that all of our latest hardware, software and 3rd party integration supports OSDP and encryption technologies all the way from the database to the identification device. They have also just released a convertor board that allows even old technology Wiegand devices to be converted into OSDP.

Saflec Systems and their flagship SACS product is well positioned to be one of the most secure access control system providers on the market!

Trade-in and trade-up with Saflec’s early Christmas promotion

Trade-in and trade-up with Saflec’s early Christmas promotion

Saflec Systems is offering you the opportunity to trade-in your old card printer for a new one with a substantial discount. This is your chance to boost productivity, cut down on printing costs and reduce your impact on the environment.


Need a new printer? Save with these specials.

If you’re in the market for a new card printer, look no further. We’ve slashed prices on Datacard’s SD260 Simplex and SD360 Duplex models. Datacard is known for their compact and cost-efficient range of card printers.


These promotions run from 8 November – 8 December 2017 or while stocks last. Don’t hesitate to contact Saflec Systems to take advantage of these incredible offers.

Saflec Systems SD-260 Trade-In Promotion
Saflec Systems SD360 Printer Trade-In Promotion
Saflec Systems SD-460 Trade-In Promotion
Saflec Systems SD260 Printer Special
Saflec Systems SD360 Printer Special

Congratulations to our latest batch of accredited Saflec Systems installers

Congratulations to our latest batch of accredited Saflec Systems installers

Last month, we hosted an Installer Training session in our brand new training room at our sales office on Ontdekkers Road. We were joined by two new trainees:

  • Michael Booyse: Infrastructure Manager for Avada Computer Technologies
  • Peter Dreyer: Service Small Works Manager for SFP Security & Fire

Our trainees spent three days wiring up a variety of products and configuring software to create a fully functioning access security control system. Our trainer course consists of three modules: Hardware Level 1 and 2, Software Level 1 and Software Level 2. Being able to simulate a live system allows them to put the theory into practice.

Students also gain insight into our proprietary access security software (SACS) and our range of locally manufactured door controllers and proximity readers.

In addition to the practical training, our students conclude their training session with a written exam. We’re thrilled to announce that both Michael and Peter passed with flying colours and were awarded certificates.

Peter Dreyer: Service Small Works Manager for SFP Security & Fire

Peter Dreyer: Service Small Works Manager for SFP Security & Fire

Michael Booyse: Infrastructure Manager for Avada Computer Technologies

Michael Booyse: Infrastructure Manager for Avada Computer Technologies

The benefits of training

Investing in your employees by offering them the opportunity to study further makes business sense. As they learn more and upgrade their skills, they add value to your company. It may take some time to see a return on your investment, but the long-term gains associated with employee training are well worth the money spent.

The cost of a short training programme is negligible when compared to the benefits of having qualified and productive staff that can help your company succeed.

Saflec Systems Refresher Course

In addition to our Installer Training programme, Saflec Systems also offers a Refresher Course. This course covers the installation and configuration of our SACS Version 3 software and a re-cap of the hardware. It is aimed at students who have completed the Installer Training programme and simply need to refresh their knowledge.

For more information on our training courses, or to check course dates and times, please email

Time to finally break away from the Wiegand format?

Time to finally break away from the Wiegand format?

Time to finally break away from the Wiegand format?

By Barend Keyser

The Wiegand interface, which rose to popularity in the 1980s, has long been accepted by the access control industry as the de facto wiring standard for interfacing between access controllers and various card or biometric readers.

As usual, the longer a technology is around, the more methods of exploiting its flaws will be found. Wiegand devices by their very nature tend to be unsupervised devices which can mean that they are the perfect attack targets for entry into secure areas – be it parliamentary buildings, airports, schools or other highly sensitive points.

The devices that are used for identifying the person attempting to attain access vary from extremely advanced (and expensive) retina, fingerprint or facial scanners through to proximity cards wielding the latest in secure storage and encrypted communication protocols. This information is then sent across insecure wires to a controller that also communicates using the latest in security.

Micro sensors that are put in place to ensure that the devices are not tampered with are ironically often disabled to make for easier servicing, do not have any method of feeding the alarm state back to a security centre, or only disable the device itself when active.

A Google search for the term ‘Hacking Wiegand Protocol’ will reveal many attacks that can be used against access control systems that employ this wiring system, including man-in-the-middle attacks whereby the CEO’s access control identification can be captured and replayed at a later point – this using a bottom-of-the-line and cheapest microcontroller with some fairly simple firmware.

There are various other issues that present themselves; including wiring length, number of wiring cores required to service the full interface, lack of encryption, overlap of card numbers and mostly unidirectional capabilities.

The access controllers or devices that use this wiring standard are not to blame for the on-going use and proliferation of this protocol as it has been used in the industry for so long that it has become ‘part of the furniture’ and accepted as the most common method for interconnectivity.

Tackling all of these challenges and allowing different devices and systems to communicate with each other seamlessly is a fairly complex task which has been taken on by the Security Industry Association (SIA). The protocol that has emerged is called OSDP (Open Supervised Device Protocol).

OSDP has been developed to communicate over two data lines and one earth line which makes it the perfect fit for RS-485 multi-drop communications, however it can also be extended to communicate over TCP/IP. Encryption has been built into the protocol, along with checksums for ensuring data integrity and monitoring capabilities to be able to tell when a device is damaged, offline or being tampered with.

As the access control industry starts to implement this protocol and the standard becomes more accepted there will be more and more devices that support OSDP and less that will implement Wiegand.

As a company, Saflec Systems has decided to start the migration process and has partnered with a number of companies, including Virdi (a popular biometrics provider) and HID to ensure that its solution is on the forefront of this OSDP revolution.

The new SDC-6xx controller range will support the OSDP protocol, and the new display reader soon to be released will also incorporate the protocol.

As the popular idiom goes – “a chain is only as strong as its weakest link”. It’s time to stop relying on this particular link.

Get to know Saflec Systems’ SDC-650 Multiple Door Controller

Get to know Saflec Systems’ SDC-650 Multiple Door Controller
Safsys SDC-650 Door Controller

With 15 years of experience in developing access control solutions, Saflec Systems never stops innovating. If you want proof, you don’t need to look much further than our SDC-650 door controller. The SDC-650 replaces the SDC-550 and brings with it a host of new features and functionalities.

The SDC-650 can control up to eight doors and you can link up to 16 SDC door controllers using a protected RS-485 network. Your PC can connect to it using RS-232, the built-in Ethernet connector or through the RS-485 network via another controller.

What’s new?

Some of the SDC-650’s most noticeable features include:

  • On-board TCP/IP and RS-232 connectivity.
  • Micro SD for increased capacities, allowing you to store 1 000 000 tags, 250 000 tags holders, more than 6 million access logs and 3 million system logs, and 256 powerful offline event/action combinations.
  • Dedicated Fire and Tamper inputs.
  • OLED control module for easy setup and local diagnostics.
  • OSDP secure channel compatibility.
Saflec Systems SDC-650 Mulitple Door Controller

An innovative, solid and powerful door controller

Of particular interest to installers is the configuration panel. With its OLED screen, and five control buttons, you can easily change pages or move to another field when configuring the controller. It also has a screen-saving mode; tapping any button will bring the screen to life and allow you to configure the device.


Communication with other controllers takes place via a robust, multi-drop RS-485 communications network. Each controller on the network must be assigned a unique address for identification and communications, but this is easily programmed thanks to the aforementioned OLED control module. 


The unit comes with a 12Vdc 5A power supply and a battery backup of 7Ah, all mounted in a lockable case, making this a sturdy but flexible piece of hardware.

SDC-650 Sample Configuration Diagram

Saflec Systems SDC-650 Mulitple Door Controller Flow Diagram
For more information about the SDC-650 door controller or any of our access control and identification products, get in touch with one of our sales representatives or email They’ll be able to answer any questions you may have and help you to design your ideal security system.