Check out our special report on casino security
CEM AC2000 Data Import Tool
Technical Specification
- Make: CEM
- Model code: AC2000 Data Import Tool
- Photo ID: Yes
- Import/Export of Information: Yes
CEM AC2000 Data Import Tool allows system administrators to import 3rd party cardholder details into the AC2000 Personnel application, which stores cardholder information on the access control system. It simplifies the bulk loading of data from a 3rd party system which is typically required during a new system installation. This removes the need for duplicate data entry and offers users a quick and efficient method of importing data into the AC2000 system. Using the interface tool, an unlimited number of records, including cardholder photographs, can be easily brought into the AC2000 system, eradicating the requirement for customised software development or time consuming database scripts.
Read more| Make | CEM |
|---|---|
| Manufacturer | CEM Systems Ltd |
| Category | Access Control>Access control software |
| Model code | AC2000 Data Import Tool |
| Photo ID | Yes |
| Import/Export of Information | Yes |
| Additional info | CEM AC2000 Data Import Tool allows system administrators to import 3rd party cardholder details into the AC2000 Personnel application, which stores cardholder information on the access control system. It simplifies the bulk loading of data from a 3rd party system which is typically required during a new system installation. This removes the need for duplicate data entry and offers users a quick and efficient method of importing data into the AC2000 system. Using the interface tool, an unlimited number of records, including cardholder photographs, can be easily brought into the AC2000 system, eradicating the requirement for customised software development or time consuming database scripts. |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

