Product images are provided for reference and may not represent the exact model, configuration, or included components.

Overview

SKU: 660-KEY-OVERRIDE
Condition: New
Availability: Usually ships in 24 hours
Write a Review 4% OFF

HES 660-KEY-OVERRIDE Key Override Module

Discontinued — No Longer Available NewThis model has been discontinued by HES. Shop current HES products → or see the recommended alternatives be…

$54.99 $52.99 SAVE $2
Usually Ships Same Business Day
In stock

Quantity:

Adding to cart… The item has been added
Compatibility guidance available for your deployment
Experts for pre and post-sales support
Technical and documentation support
Shipping and lead-time confirmation before install

Laura Bennett, IPSD Senior Specialist

Talk to Laura

Specialized training • U.S - based

Senior Specialist • 877-277-7147

HES 660-KEY-OVERRIDE Key Override Module

$54.99
$52.99

Overview

SKU: 660-KEY-OVERRIDE
Condition: New
Availability: Usually ships in 24 hours

No Bots, Just Experts

Questions about this product? Free pre-sales support from a senior specialist — product questions, compatibility checks, BOM quotes, price confirmation — typically answered within one business day. Need camera placement or system design work? Engineering time is $175 per hour (qty 1 = 1 hour). Hardware buyers get up to one hour ($175) credited back on their order.

Description

Discontinued — No Longer Available New

This model has been discontinued by HES. Shop current HES products → or see the recommended alternatives below.

HES 660-KEY-OVERRIDE Key Override Module

Overview

The HES 660-KEY-OVERRIDE is a key override module designed to integrate with HES security systems, providing manual override functionality through key-based activation. This accessory serves as a critical backup control method for access control applications where manual intervention is required, ensuring operational continuity even during system anomalies or emergency situations.

Key Features

  • Key-based manual override activation for HES systems
  • Seamless integration with compatible HES security platforms
  • Backup access control method for emergency scenarios
  • Override module form factor for standard installation
  • Designed for professional security system integration

Technical Highlights

This override module integrates directly into existing HES control infrastructure, enabling authorized personnel to bypass electronic access restrictions when necessary. The key-activated design provides both security and reliability, ensuring that manual override capability remains available without compromising system integrity. The module is built for installations requiring redundant control methods and emergency access provisions.

Applications

The 660-KEY-OVERRIDE is ideal for commercial security installations, data centers, facilities management, and enterprise access control deployments where manual override capability is essential. It supports compliance requirements for emergency egress and provides facility managers with a reliable secondary control mechanism.

Compatibility & Integration

The 660-KEY-OVERRIDE is compatible with HES security system platforms. To verify compatibility with your specific system configuration and deployment environment, consult with your security integrator or system administrator before installation.

Specifications
Form Factor: Override Module
Q&A
Reviews
Have Questions? Ask an Expert.

RELATED PRODUCTS

System Design, Deployment & Technical Support

Support services and planning resources for commercial surveillance, access control, and infrastructure deployments.

Fixed scope • Fixed price

System Design Assistance

  • Get help validating product compatibility
  • Coverage requirements
  • Storage planning and deployment architecture before you buy.
Request Design Help

Deployment & Configuration Support

  • Access fixed-scope support for rollout planning
  • User setup guidance
  • Migration and system standardization across single-site or multi-site deployments
View Support Services

Guides, Tools & Calculators

  • PoE requirements
  • Storage retention
  • Camera selection and deployment methodology
Open Technical Resources