Warning: A non-numeric value encountered in /home/ylqxryiq0iwi/public_html/assettrackingrfid.com/wp-content/themes/Divi/functions.php on line 5837

RFID Asset Management System

RFID Asset Management ♦ RFID Asset Tracking

RFID Asset Location System ♦ Bar Code Asset Management System

Asset Depreciation and Valuations ♦ Asset Inspections and Calibrations

Warehouse Management Systems ♦ Inventory Management ♦ Tool Tracking

info@virtualdoxx.com 877-280-RFID (7343)

Select Page

RFID Asset Security

The primary use of RFID security for protecting assets against theft or unauthorized removal from premises, is to place RFID antennas at facility exit(s). If and when RFID asset tags are detected at an exit, the RFID asset management software automatically looks-up the asset in the database to determine if the asset is authorized for removal.

If the asset(s) are approved for removal, then the location of the assets are updated in the database to the exit door and/or to the person removing the assets, if staff have RFID ID cards. If the asset(s) is or are not approved for removal, network flashing lights and alarm are engaged at the doorway and/or at any network-connected location within facilities. Additionally, email and/or SMS alerts are automatically transmitted to defined personnel.

Any unauthorized removal of asset(s) creates an audit-trail database record in the RFID asset management software (audit trail historical record) that includes asset #, asset description, exit point, alert-type and time/date. The audit trail time/date can be reconciled against video of the exit point to determine the person(s) that removed asset(s) in an unauthorized manner.

For highly sensitive assets, when RFID antennas detect unauthorized asset(s) at an exit point, the RFID reader can cause the doors to lock.