Access readers and hardware: tailored to your requirements

Tailor-made access readers and access control hardware for use with GFOS.Access Control: thanks to our experienced partner companies for security solutions, we ensure secure processes in your day-to-day work - no matter what industry you work in. Discover the numerous possibilities around RFID, NFC, biometrics and more.

Request a demo

Request factsheet

Main features

Access readers as the ideal complement to GFOS software

From the simple personnel lock to time and production data acquisition to 2-factor authentication in combination with biometric access control system: the GFOS software world processes information from a wide variety of areas and controls authorizations in exchange with the access controller used - which is the heart of the system's hardware. These controllers control all the connected readers that ensure your company's security.

In addition, vehicle barriers can also be connected, elevators controlled and visitors registered and directed. We solve your requirements with our hardware partners. 

We cooperate with the largest providers of time and access peripherals: PCS Systemtechnik, Datafox, GANTNER und dormakaba. This also makes it possible to connect offline terminals to the online world.

Use the latest access readers for entrance situations with public traffic. We supply combined access readers consisting of RFID readers and QR code readers in conjunction with a PIN. Customers and visitors receive a welcome letter with a QR code and personal PIN and can gain one-time access on the day of their visit using the QR code on the email (printed or via smartphone). Employees use their RFID ID in the conventional way. This is how we design modern access today.
Reinhold Roth, Partner Manager of Sales (GFOS mbH)
These customers rely on access control software from GFOS

View all references

Your benefits

The advantages of access readers and hardware from GFOS

Combination of the manufacturers

Combine access control hardware from different manufacturers to precisely map the needs of the company.

Simple administration

User authorizations can be easily edited and thus quickly updated or removed - without replacing physical keys.

Mapping security requirements

Your security requirements can be covered precisely thanks to various access readers and possible hardware combinations.

Traceable protocols

The GFOS access control software logs all information on successful and rejected access for you.

Save costs

RFID media are reusable. After an employee has left or a visitor has left, the media can be reused - or you can release lost transponders again.


As you grow, the system simply grows with you. We connect various manufacturers of access control system hardware. We also use the option of integrating battery-operated components from various manufacturers into the GFOS system. 

In use

RFID access readers - practical and scalable

GFOS enables flexible contactless access via RFID (radio frequency identification): all you need to do is hold an RFID card or a corresponding transponder up to an access reader. The technology can be quickly integrated into existing security infrastructures: connect existing mechatronic locking systems.

Using read/write terminals and in exchange with the access controller, updates can be made to the access authorizations that are also used for the offline terminals. These are transferred to the employee's ID card using the Network-on-Card (NoC) principle. In this way, access authorizations can also be limited for very short periods of time. This is particularly important in the event of IDs being lost and helps you to achieve maximum security for your company.

Maximum security with biometrics

Our solutions with biometrics enable highly secure access control system for companies with the highest security standards. Linking to unchangeable physical characteristics (e.g. with palm vein pattern authentication scanners from PCS) ensures protection against forgery - stolen passwords or access cards cannot cause any damage. The security requirements can even be increased by combining several features. You can either use biometric features such as fingerprints or palm vein pattern authentication with an RFID card or a PIN as two-factor authentication. The combination of the factors "Being" (biometrics), "Knowing" (PIN) and "Owning" (ID) significantly increases access security in your company and prevents unauthorized access. 

Easily combine time tracking software and access control system

GFOS time tracking terminals can also conveniently manage access control. The same ID (transponder, card, etc.) can include various applications. In addition to time tracking software, the terminals can also control access and provide information on balances, from remaining vacation and overtime to flextime accounts. It is also possible to log in and terminate business trips or business trips directly at the terminal.  You can also use the evaluation of people present as an important source of information in the company to create an evacuation list in the event of an emergency. This is how you can safeguard your company across the board.

All features

Your options thanks to custom-fit access control hardware

RFID access control

Use RFID transponders or cards to enable contactless access: simply hold them in front of the reader and off you go. Highly secure thanks to AES encryption between reader and ID (MIFARE Desfire). 

Biometric access control system

More security for sensitive areas: Use GFOS software with biometric access readers - for highly secure identification methods.

Role and authorization concept

Time or person-controlled access: the hardware controllers used control the readers and check the predefined profiles.

Combining time tracking software and access

One ID for different functions: with the right hardware, you can combine time tracking software, access control and other applications.

Mobile access procedures

Is your own smartphone the medium for access? With, you can also open doors or barriers with your end device (iOS / Android).

Two-factor authentication

Combine different access methods to increase security requirements on your premises: “knowing" (PIN), “owning" (ID) and “being" (biometrics).

React precisely with access readers

Connecting intercom systems

It is also possible to integrate access readers into intercom systems (e.g. Siedle, Ritto or Behnke) with the GFOS solution. These modules are integrated directly into the system setup.

Anti-passback function

Prevent passing on of IDs or other such similar instances: for example, employees must first check out of one area before they can try to access another area.

Multi-level access control

Combine the access readers with PIN codes or biometrics: this allows you to map higher security requirements for sensitive areas such as server rooms, laboratories or personnel archives.

Mobile access control system

With BLE (Bluetooth Low Energy), you can also control access with your smartphone. Our security experts will be happy to advise you on the options.

Success Stories
Our goal was to achieve an auditable organization of the locking systems and to protect our assets in the best possible way against unauthorized access.
Peter Hof (Stadtwerke Hilden)

Successes with access readers and hardware from GFOS

What is the difference between online and offline access?

Online access refers to an access control system in which the hardware components, such as access readers and door controllers, are continuously connected to a central server or database. Authorizations are checked and communication with the server takes place in real time. When users attempt to open a door, authorization is checked immediately. Access is only granted once authorization has been granted. Offline access, on the other hand, refers to a system in which the hardware components work independently of a central server. The access rights are stored on a card or an access transponder, and the validation of authorizations is carried out locally at the readers. The authorizations are synchronized between the devices and the server at regular intervals and transferred back to the person's ID medium using read/write terminals. This ensures that up-to-date information is available.

Can online and offline access be combined?

Yes, with the help of GFOS software, online and offline access can be easily combined. Our software supports the integration of digital locking systems. This provides you with many expansion options for your access control system. This requires the connection of at least one read/write terminal on which the authorizations are updated. As soon as your employees use this terminal, the authorizations on the ID medium are updated. 

Which hardware providers does GFOS work with?

We work with the best-known hardware providers in the DACH region: PCS Systemtechnik, dormakaba, Datafox and GANTNER. The hardware components can also be combined with each other. The cooperation with our hardware partners also enables you to integrate battery-operated offline solutions from Uhmann & Zacher or PegaSys from SimonsVoss. You can decide whether you want to connect wirelessly or via Network-on-Card (NoC) or CardLink. Depending on the requirements in combination with the necessary security technology, we will make a decision together with you from door to door. Our partners provide support by supplying everything from motorized locks to individualization systems and installation of the access control hardware. This gives you countless options for secure access control system. Our software has a modular communication interface. This enables native integration of the terminals - i.e. without detours via the respective manufacturer's software and therefore also in mixed operation. This also makes it easy to connect hardware solutions that are already in use. The FMD is scalable, meaning that you can use very few terminals for access control as well as several thousand terminals.

Which Datafox EVO terminals can be connected to the GFOS software?

GFOS supports the entire terminal family of the Datafox EVO series. These are the terminal types for stationary time tracking: EVO 4.6 FLEXKEY, EVO 4.3, EVO 3.5 UNIVERSAL (IP66, IP69K), EVO 5.0 PURE and EVO 3.5 PURE.

Why GFOS software is worthwhile

Users: 3 million

On average, 3 million users utilize GFOS software every day. This is how we digitize working environments worldwide and ensure future viability.

Custom Interfaces 70+

The system is perfectly integrated into your existing IT system landscape with over 30 interfaces to payroll accounting systems and over 40 interfaces to ERP systems.

Countries: 30

Our software is serving to cut labor costs substantially in over 30 countries.

Languages: 18

GFOS solutions are available in 18 languages. This means you benefit from the international deployment options.

Experience: 35+ years

With over 35 years of success and a broad partner network, we offer cross-industry solutions for companies of all sizes.

Act now

Want to get more information about access readers and hardware for your company or ?Then just get in touch with us!

Reinhold Roth
+49 (0)201 / 61 30 00


Get full insight into GFOS.Access Control
User manual
Call us at

+49 . 201 • 61 30 00

Contact us at

To the contact form

Back to top

We are certified