Casi Rusco SAPPRO-500-SW Access control system
Technical Specification
- Make: Casi Rusco
- Model code: SAPPRO-500-SW
- Series: Sapphire Pro Series
- Standalone/ Networked/ PC: Networked
The Sapphire Pro system provides a fully integrated solution for access control, security, alarm monitoring and photo ID badging applications. Sapphire Pro is ideally suited for medium to high end sized facilities and delivers unsurpassed simplicity and performance with tools as Auto Configuration, Data Guard and Instant Access. Sapphire Pro offers database partitioning and multiple server operation, with up to 32 fully functional workstations per server. Sapphire support ACU Intelligent Controller with dial-up and Models 940/950/960 and Models 970-973, Model 1100 proximity card readers.
Read more| Make | Casi Rusco |
|---|---|
| Manufacturer | Interlogix |
| Category | Access Control>Access control systems & kits |
| Model code | SAPPRO-500-SW |
| Standalone/ Networked/ PC | Networked |
| Additional info | The Sapphire Pro system provides a fully integrated solution for access control, security, alarm monitoring and photo ID badging applications. Sapphire Pro is ideally suited for medium to high end sized facilities and delivers unsurpassed simplicity and performance with tools as Auto Configuration, Data Guard and Instant Access. Sapphire Pro offers database partitioning and multiple server operation, with up to 32 fully functional workstations per server. Sapphire support ACU Intelligent Controller with dial-up and Models 940/950/960 and Models 970-973, Model 1100 proximity card readers. |
You might be interested in these products
Related Whitepapers
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
Integrated access control: reap the benefits of connected security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
