IDEM Rotary Trapped Key Systems from AutomationDirect

DCS IDEM Rotary Trapped Key System from Automation Direct 1 400x275

November 4, 2022

 

AutomationDirect has added IDEM Skorpion rotary trapped key systems. These safety systems control access to running equipment with locks and rotary keys. 

To disable power to machinery and unlock a gate, the key is turned and removed from the control switch. The released key is then inserted into the gate access module to unlock the gate. 

Standard and solenoid-locking control switches and associated gate sets (sold separately) are available for one to three stations and provide mechanical safeguarding in partial or full body access versions. 

They are rated for safety applications up to Ple/Category 3 according to EN/ISO 13849-1. 

The new IDEM Skorpion rotary trapped key systems and accessories start at $210.00 and come with a one-year warranty.

 

To learn more about the IDEM Skorpion rotary trapped key systems available at AutomationDirect, click here

Automation Direct Logo 300x150

 

 

 

Related Articles



Editor’s Pick: Featured Article

Weidmüller’s u-control 2000: The Automation Controller

Weidmüller’s u-control 2000: The Automation Controller

Weidmüller’s scalable engineering software, u-control 2000, adapts individually to your requirements. And, the u-control is powerful, compact and fully compatible with Weidmüller’s I/O system u-remote. This article looks at what makes u-control the heart of your automation.

Programmable logic controllers (PLCs) are one of the main components of any automated system. A typical control system has inputs, outputs, controllers (i.e., PLCs), and some type of human interaction with the system, a human machine interface (HMI), for example.

Read More



Latest Articles

  • How to Select the Correct Data Cable for Your Industrial Application

    July 18, 2024 In this article, you will learn what the most common mistakes are when selecting Industrial Ethernet and bus cables and how to avoid them. All cables and wires that contribute to communication in any way are commonly referred to as data cables. However, there are significant differences such as the multitude of… Read More…

  • Legacy OT Risks: The Hinderances of Aging Systems – and How to Move Forward

    July 15, 2024 Today, the role of a chief information security officer (CISO) comes with a heavy ethical and social responsibility. Yes, we and our teams have a primary responsibility to protect the cybersecurity of critical infrastructures that provide vital services like electricity, water, oil, gas, healthcare, and food production, to name a few. As… Read More…