SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Openow from SMARTair wireless access control

    Openow from SMARTair wireless access control

    Vanderbilt Bluetooth Low Energy readers

    Vanderbilt Bluetooth Low Energy readers

    Dahua Fixed-focal Dome Network Camera

    Dahua Fixed-focal Dome Network Camera

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • TDSi to unveil latest GARDiS integrated security solutions product line at Intersec 2020 in Dubai
    • Technocover achieves 100% across all assessment categories in the Achilles UVDB verify audit
    • Minut unveils fully secure, all-in-one Smart Home Alarm for residential security systems in the UK
    • IDIS DirectIP NVR-anchored video surveillance solution and SARC secure luxury cars at Autobahn Collision
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • Year in Review 2018
    • Year in Review 2017
    Featured
    • MOBOTIX M7 platform provides more flexibility and computing power
    • Trends in banking security include more networks and software
    • Fast and accurate, Rapiscan’s CT scanning improves airport baggage screening
    • The intersection of education and fire and security
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Upcoming Events
    • Crime Prevention International Conference (CPIC) 2019
    • IFSEC India 2019
    • 2019 China Smart Homes & Buildings Expo
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Crime Prevention International Conference (CPIC) 2019

    Crime Prevention International Conference (CPIC) 2019

    2019 China Smart Homes & Buildings Expo

    2019 China Smart Homes & Buildings Expo

    Oman Facilities & Environment Exhibition & Conference 2020

    Oman Facilities & Environment Exhibition & Conference 2020

    Kuwait Health Safety & Environment Forum 2020

    Kuwait Health Safety & Environment Forum 2020

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Nedap Security Management
    • ASSA ABLOY EMEA
    • Hanwha Techwin America
    • ISONAS, Inc.
    Other Resources
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Financial institutions require future-ready physical security technologies

    Financial institutions require future-ready physical security technologies

    H.265 High Efficiency Coding: Video compression for security applications

    H.265 High Efficiency Coding: Video compression for security applications

    How to overcome the storage challenges of adopting surveillance AI

    How to overcome the storage challenges of adopting surveillance AI

    Physical security supports a future-proof cyber security strategy

    Physical security supports a future-proof cyber security strategy

About us Advertise
  • Artificial intelligence (AI)
  • Cyber security
  • ISC West
  • Counter Terror
  • Robotics
  • Body worn video cameras
  • Intrusion detection
  • Video management software
  • Trade Show/Exhibition
  • Video analytics
  • View all
  1. Home
  2. Products
  3. Access Control
    CCTV Intruder Alarms
  4. Access control software
  5. CEM AC2000 Muster Zones

CEM AC2000 Muster Zones application for emergency situation

Technical Specification

CEM AC2000 Muster Zones application for emergency situation
  • CEM AC2000 Muster Zones application for emergency situation
  • CEM
Features:
  • Make: CEM
  • Model code: AC2000 Muster Zones
Additional info:

CEM AC2000 Muster Zones application is used for emergency situations where card holders must congregate in a dedicated ‘safe’ location. The application can be used both in the evacuation of card holders to a location away from the site (or zone) or when necessary it can be used to enable card holder’s to move to a particular safe location within the premises

Read more
Contact manufacturer Datasheet
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Make CEM
Manufacturer CEM Systems Ltd
Model code AC2000 Muster Zones
Additional info CEM AC2000 Muster Zones application is used for emergency situations where card holders must congregate in a dedicated ‘safe’ location. The application can be used both in the evacuation of card holders to a location away from the site (or zone) or when necessary it can be used to enable card holder’s to move to a particular safe location within the premises
Download PDF version
Contact CEM Systems Ltd

More CEM Access control software

CEM SWXML AC2000 XML interface

CEM SWXML AC2000 XML interface

CEM SWENET256 Ethernet reader controller software for 256 doors

CEM SWENET256 Ethernet reader controller software for 256 doors

Tyco's CEM AC2000 Lite - low cost access control for small to medium sized facilities

Tyco's CEM AC2000 Lite - low cost access control for small to medium sized facilities

CEM AC2000 Data Import Tool

CEM AC2000 Data Import Tool

CEM Systems release AC2000 SE v6.3 at IFSEC

CEM Systems release AC2000 SE v6.3 at IFSEC

CEM SWENETUPG128-256 Ethernet reader controller upgrade licence

CEM SWENETUPG128-256 Ethernet reader controller upgrade licence

CEM SWENET128 Ethernet reader controller software for 128 doors

CEM SWENET128 Ethernet reader controller software for 128 doors

CEM webEntry II Pro System

CEM webEntry II Pro System

CEM AC2000 version 7 access control system

CEM AC2000 version 7 access control system

CEM SYS/101/300 PC with SWENET256 software

CEM SYS/101/300 PC with SWENET256 software

CEM AC2000 AE System

CEM AC2000 AE System

CEM SYS/601/032 32 door licence

CEM SYS/601/032 32 door licence

CEM SWNVR-EX AC2000 exacqVision interface

CEM SWNVR-EX AC2000 exacqVision interface

CEM webEntry™ TimeManager for time and attendance reporting

CEM webEntry™ TimeManager for time and attendance reporting

CEM SWNVR-IV AC2000 IndigoVision NVR interface

CEM SWNVR-IV AC2000 IndigoVision NVR interface

View all

You might be interested in these products

Protecting your physical access control system: Nedap's new end-to-end security solution

Protecting your physical access control system: Nedap's new end-to-end security solution

Vanderbilt ACT Enterprise: secure access control environment

Vanderbilt ACT Enterprise: secure access control environment

CLIQ® Connect access control cuts fuel costs

CLIQ® Connect access control cuts fuel costs

CLIQ® access control - SaaS solution

CLIQ® access control - SaaS solution

DSX Mobile Command smart phone application

DSX Mobile Command smart phone application

Gallagher Command Centre

Gallagher Command Centre

HID Building Occupancy Management an HID Location Services Solution

HID Building Occupancy Management an HID Location Services Solution

Openow from SMARTair wireless access control

Openow from SMARTair wireless access control

  • See other CEM products
  • CEM Access control readers
  • CEM Access control controllers
  • CEM Access control systems & kits
  • CEM Access control system accessories
  • CEM Electronic locking devices
Product news
CEM Systems releases version 8 of AC2000 security management system

CEM Systems releases version 8 of AC2000 security management system

Tyco announces integration of CEM Systems AC2000 with Aperio wireless locks

Tyco announces integration of CEM Systems AC2000 with Aperio wireless locks

Tyco Security Products releases CEM Systems AC2000 v7.1 access control and security management systems

Tyco Security Products releases CEM Systems AC2000 v7.1 access control and security management systems

View all
Related tags
  • Security devices
  • Security access systems
  • Security software

Follow us

Sections Products Companies News Insights Case studies Markets Events White papers Videos
Topics Artificial intelligence (AI) Cyber security ISC West Counter Terror Robotics Body worn video cameras Intrusion detection Video management software Trade Show/Exhibition
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
About this page

Detailed technical specifications of the CEM AC2000 Muster Zones Access control software, one of over 762 Access control software in our catalog. Download datasheet or contact manufacturer to make product inquiries.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2019, all rights reserved

Our other sites: SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download SourceSecurity.com product tech spec
Updated Privacy and Cookie Policy
We have updated our Privacy Policy for GDPR.
We also use cookies to improve your online experience, Cookie Policy