PDF Print Email

Medeco XT




Medeco XT is a complete electronic locking system providing Controlled Access, Accountability, Physical Security, and System Management. More than just a way to protect your property, equipment and assets, Medeco XT is also a business tool that can lead to a substantial return on investment.

Controlled Access - Keys are electronically programmed to open only specific locks during a designated schedule. Schedules may also contain an expiration point to completely disable the key until it is audited and reprogrammed.

Accountability - Audit information recorded in both the lock and key shows a time-and-date stamped record of every event, including authorized accesses and unauthorized attempts.

Electronic Rekeying & Scheduling - Respond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys.

Easy Installation - Medeco XT key provides all power to the cylinder, eliminating the need for any hard wiring or power supply. Simply remove the existing mechanical cylinder and install the Medeco XT cylinder.

Physical Security - Medeco XT products add a wide variety of intelligent features without compromising on physical security. Attack-resistant design and tamper-proof features provide strong protection against forced entry.

Efficient System Management - Medeco XT software contains tools that will help you manage your security more efficiently. Flexible programming, scheduled access and full audit reports are offered with the convenience of stand-alone or web-based software.

Unlimited Applications - Medeco XT cylinders are available to fit nearly any application or hardware type for enhanced security and accountability.

PDF Catalogs / Sizes /Specs

Medeco XT Brochure

Medeco XT Support Documentation

Medeco XT 3GP Key Programmer / Charging Station


To further enhance Medeco XT, Midwest Security Products designed the 3GP, a programmer / charging station that eliminates the need for network access to the internet.  This solution is ideal in environments where security policies prohibit peripheral devices or client software.

PDF Catalogs / Sizes /Specs

XT 3G Programmer Quick Reference Guide



Using data drawn directly from your Medeco XT system, XT Analyzer's metrics charts allow you to quickly visualize the full scope of employee activity within your organization, so that you can pinpoint critical areas and determine where to focus your efforts. You can dynamically analyze your data to see the big picture, or drill down to see the minute details. Either way, XT Analyzer enables you to strategically mine your data for the business intelligence you need for effective, knowledge-based decision making.

XT Analyzer gives you the opportunity to look at your data in thousands of different ways. Whether you have a metric in mind, or whether you are discovering metrics along the way, XT Analyzer delivers the answers you need to effectively manage your security operation and proactively prevent future incidents.

With only a few clicks of your mouse, you can generate charts, graphs or numeric tables for reporting on trends, performance, locations and much more. Even link to video streams of specific events. Quantitative and qualitative results are displayed instantly and easily interpreted. Just launch XT Analyzer with any browser, and start delivering your data.

Medeco XT Web Hosting Solutions

XT web hosting solutions, add internet convenience and remote programming capability to support your Medeco XT locks and further enhance functionality.

Web hosting solutions allow system administrators to remotely program Medeco XT keys from nearly any location using web-based software.

Supported remote programming devices for Medeco XT keys connect directly to the network. When a key is placed in the programming device it automatically uploads audit information and downloads new access rights without the key holder ever needing to interface directly with the software or the internet. If desired, keys can be set to expire at predetermined dates and times to reduce liability, and then key holders can easily retrieve new access rights from one of the unattended programming devices.

Joomla Templates by Joomlashack