Casi Rusco Micro/5-PX Access control system
Technical Specification
- Make: Casi Rusco
- Model code: Micro/5-PX
- Standalone/ Networked/ PC: PC-based
The Micro/5 is a user configurable microcontroller for use with the full line of CASI access control and alarm management software. The Micro/5 provides distributed processing for the interface of access control readers, keypads, alarm inputs and outputs back to a host system computer. CASI's distributed processing allows each Micro/5 microcontroller to operate independent of the host system computer with the majority of access control and alarm monitoring decisions made locally at the microcontroller. The Micro/5 additionally incorporates "FLASH" memory technology that provides the ability to receive its operating system and application remotely from the host system over the already established communication path.
Read more| Make | Casi Rusco |
|---|---|
| Manufacturer | Interlogix |
| Category | Access Control>Access control systems & kits |
| Model code | Micro/5-PX |
| Standalone/ Networked/ PC | PC-based |
| Additional info | The Micro/5 is a user configurable microcontroller for use with the full line of CASI access control and alarm management software. The Micro/5 provides distributed processing for the interface of access control readers, keypads, alarm inputs and outputs back to a host system computer. CASI's distributed processing allows each Micro/5 microcontroller to operate independent of the host system computer with the majority of access control and alarm monitoring decisions made locally at the microcontroller. The Micro/5 additionally incorporates "FLASH" memory technology that provides the ability to receive its operating system and application remotely from the host system over the already established communication path. |
You might be interested in these products
Related Whitepapers
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
Integrated access control: reap the benefits of connected security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
