Sales Support Services

At Radionix, we’re here to support you at every stage of your security projects. From choosing the right products and designing effective systems to providing reliable after‑sales support, we help you move faster and work smarter. Our experts ensure you have the tools, knowledge, and support needed to deliver successful security solutions.

Getting the products

Product Catalog

Where to buy

Software download store

Licensing portal

Mobile Apps

Designing your system

System Surveyor

System design platforms

Radionix’s partnership with System Surveyor now allows for faster designs and smarter surveys. System Surveyor is the leading software platform for site surveys, system design & lifecycle management. Automate BOM’s with Radionix products and devices for faster, more professional bids.

Access Modular Controller

Controllers Download
Controllers
Extensions
Download
Controllers
Power Supply
Download

Readers and Cards

Card Reader iClass Download
Card Reader iClass
Card Reader MIFARE
Download
Card Reader iClass
LECTUS select
Download
Card Reader iClass
LECTUS select E
Download

Smartkey Arming Devices

SmartKey Arming Device, Conventional Download
SmartKey Arming Device, Conventional
SmartKey control unit SE 60, LSN
Download
SmartKey Arming Device, Conventional
SmartKey control unit SE 120, LSN
Download
SmartKey Arming Device, Conventional
SmartKey control unit SE 220, LSN
Download
SmartKey Arming Device, Conventional
SmartKey control unit SE 320, LSN
Download

Smartkey Readers

SmartKey Reader with Keypad Download
SmartKey Reader with Keypad
SmartKey reader
Download

Blocking Elements

Blocking element Download
Blocking element
Blocking element, surface mount kit
Download

GLT Glass Break Detectors

Glass Break Detector (Accustic) Download
Glass Break Detector (Accustic)
Glassbreak
Download

REX Detectors

Request Exit Sensor Download
Request Exit Sensor
Request-to-Exit
Download

Motion Detectors - Tri Tech

TriTech Blue Line Gen2 Download
TriTech Blue Line Gen2
TriTech Commercial Series
Download
TriTech Blue Line Gen2
TriTech w AntiMask Commercial Series
Download
TriTech Blue Line Gen2
TriTech ProSeries
Download
TriTech Blue Line Gen2
TriTech w AntiMask ProSeries
Download

Motion Detectors - Curtain

TriTech Curtain ProSeries Download
TriTech Curtain ProSeries
TriTech Curtain w AntiMask ProSeries
Download

Motion Detectors - Ceiling mount

PIR Ceiling Download
PIR Ceiling
Motion detector 360 ceiling mount
Download
PIR Ceiling
Motion detector 360 ceiling 24ft (7.5m)
Download
PIR Ceiling
TriTech Ceiling
Download

Motion Detectors - PIR

Classic Line Download
Classic Line
Blue Line Gen2 PIR Motion Detector
Download
Classic Line
Motion Detector, 40ft (12m)
Download
Classic Line
Motion Detector, 50ft (15m)
Download
Classic Line
Motion Detector, 60ft (18m)
Download
Classic Line
PIR Blue Line Gen2
Download
Classic Line
PIR Motion Detector, 40ft (12m)
Download
Classic Line
PIR ProSeries
Download
Classic Line
PIR w AntiMask ProSeries
Download

Software Development Kit

Use the Intrusion Software Development Kit (SDK) to integrate B Series and G Series intrusion control panels into your applications.

 

Download icon

Software Development Kit (SDK v2.0.44)

B Series and G Series

Download icon

Software Development Kit (SDK)

Datasheet Overview

Remote Programming Software Application Programming Interface (RPS-API)

Use the Intrusion RPS-API to integrate B Series and G Series Intrusion control panel programming into your applications.

 

Download icon

RPS-API

B Series and G Series RPS

Download icon

RPS-API

Datasheet Overview

‘How to’ Guide

Use the following guidelines to learn how to integrate Radionix intrusion control panels with your application, and to identify if you need the Mode 2 protocol, the Remote Programming Software Application Programming Interface (RPS-API) or the Intrusion Software Development Kit (SDK) for your application.

Mode 2 requests can be sent to integrations@radionix.com.

 

Download icon

Commands available with Mode 2 Protocol

 

Download icon

Functions available with Intrusion Software Development Kit (SDK)

 

 

Download icon

Functions and overview of RPS Application Programming Interface (RPS-API)

 

Download icon

WebConnect Service Use for RPS

Remote Programming Software Introduction to WebConnect

 

Download icon

WebConnect Service Use for RPS-API

Remote Programming Software - API Introduction to WebConnect

‘How to’ Guide

Use the following guidelines to learn how to integrate Bosch access control with your application

Access Control API - How-to videos

Access Management System - Access Control API - Part 1 Introduction

Access Management System - Access Control API - Part 1 Introduction

The Access Control API is available for Access Management System to allow connectivity to third party software. This video is the first in a how-to series on how to use the API.

Access Control API - Part 2 REST API with Swagger

Access Control API - Part 2 REST API with Swagger

This video will demonstrate using Swagger to send REST commands in order to work with AMS master data.

Access Management System - Access Control API - Part 3 - gRPC with Kreya

Access Management System - Access Control API - Part 3 - gRPC with Kreya

In this video you will see how to stream messages from AMS to your applications via a gRPC demonstration using Kreya.

Access Management System - Access Control API - Part 4 - REST API with cURL

Access Management System - Access Control API - Part 4 - REST API with cURL

In this video you will see how to send REST commands directly by cURL with the session ID.

AMS and B/G intrusion panel integration - How-to videos

AMS B/G Integration - Part 1 Introduction

AMS B/G Integration - Part 1 Introduction

The first video of the series introduces the integration of AMS with B / G Series intrusion panels. In this video you will learn about the integration topology, key features, prerequisites and licensing.

AMS B/G Integration - Part 2 Installing RPS API

AMS B/G Integration - Part 2 Installing RPS API

The Intrusion RPS API is the communication channel between Access Management System (AMS) and RPS. This video demonstrates how to install the RPS API and certificates.

AMS B/G Integration - Part 3 Connecting AMS to Intrusion Panels

AMS B/G Integration - Part 3 Connecting AMS to Intrusion Panels

This video shows how to view the B/G intrusion panels in Access Management System (AMS) and make them available for control through Map View and/or user administration. The steps include defining and configuring the connection to the RPS API.

AMS B/G Integration - Part 4 Command and Control in Map View

AMS B/G Integration - Part 4 Command and Control in Map View

The command and control feature of the Access Management System (AMS) and B/G Series integration enables an operator to monitor and send commands to intrusion areas and devices through AMS Map View. This video demonstrates how to configure and operate this part of the integration.

AMS B/G Integration - Part 5 Panel User Administration

AMS B/G Integration - Part 5 Panel User Administration

This video demonstrates how Access Management System (AMS) can be used for intrusion panel user administration. In this video you will find prerequisites and how-to instruction on creating and assigning authorization profiles for intrusion panels and assigning cards to intrusion panel users.

AMS B/G Integration - Part 6 B901 Door Controller Integration

AMS B/G Integration - Part 6 B901 Door Controller Integration

This video pertains to the use of the B901 Door Controller which can interface with the B or G intrusion panel. When integrated with Access Management System (AMS), the state of the intrusion door can be controlled through AMS Map View.

AMS B/G Integration - Part 7 Reporting on Intrusion Events

AMS B/G Integration - Part 7 Reporting on Intrusion Events

This is the final video in the Access Management System (AMS) and B/G intrusion integration series. AMS offers a collection of report functions that can benefit the integrated security system. This video gives instruction on using the AMS reporting tools to examine intrusion events.

After sales support

Order tracking

Data Transfer Information