
Our Ethos access readers deliver security and convenience for your facility, enabling employees to access buildings using mobile credentials or smart cards.
The Ethos line of access readers includes the Mullion Model ET10, Single Gang Model ET20, and the Keypad Model ET25. Each multifunctional access reader features mobile wallet credential capabilities and remote programming while utilizing existing wiring for simple upgrades. The Prox filter ensures only smart, secure credentials are read for enhanced security. With unlimited access, flexible upgrades allow you to transition at your own pace without reconfiguring readers.
Ethos Access Reader is Going End of Life on December 31, 2026
In 2025, Wavelynx launched our brand new APEX Reader to the market. APEX takes all of the features and functions you’ve come to love in our Ethos products and offers a simplified installation, and ensures you’re ready for new credential technology all in a new modern design.
With this launch, we are announcing the end of life of the Ethos reader product line.We will continue to manufacture and sell Ethos products through December 31, 2026.
Read more about this announcement.

See how RiverSouth Austin revolutionized tenant experience with Ethos Readers and mobile access control for modern, secure building entry.
A comprehensive testing program that validates the interoperability of devices.
Supports NXP's MIFARE® DESFire® EV1, EV2, EV3 and MIFARE 2GO credential technologies.
Through an OSDP secure channel, users are able to make remote updates when needed.
Employee credentials stored in their mobile wallet provides the use of a smart device to gain access.
One Universal Credential. Unlimited Interoperability. This innovation combats proprietary technology and provides choice to the customer.
Supports Proximity (125 kHz), Smart (13.56 MHz), Mobile Wallet, and Bluetooth®, making the transition to each credential type seamless and secure.

.png)



.png)




.png)
.png)
.png)

.png)
.png)
.png)

.png)

.png)
.png)
.png)
.png)
.png)
.png)
.png)
.png)
.png)
.png)
.png)
.png)
.png)
.png)
.png)
.png)
.png)
.png)


.png)
Ready to move beyond legacy access control?
Let’s walk through what a modern transition looks like.