SourceSecurity.com US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Unique perspectives

Tyco Security Products launches new version of C•CURE 9000 v2.60 security and event management platform

Published on 17 Mar, 2017

The platform’s after-hours reader groups allow security officers to funnel access through a central entry point
C•CURE 9000 v2.60 offers advanced access control policy enforcement and customisation

Tyco Security Products, part of Johnson Controls, introduces the newest version of its C•CURE 9000 security and event management platform that offers new functionalities for enhanced compliance controls and increased operational efficiency

Advanced access control policy enforcement

C•CURE 9000 v2.60 offers advanced access control policy enforcement and customisation, after-hours reader groups, expiring clearances and other notable features, as well as increased operational efficiency. This latest version of the C•CURE 9000 security and event management platform also supports IPV6 address protocols for the iSTAR Ultra door controller and introduces a new C•CURE 9000 Web Client user interface.

The usability enhancements to the C•CURE 9000 v2.60 platform give end users the power to configure the platform to create a new event after a number of consecutive rejections. With this feature, end users can define the threshold for event creation by configuring the number of consecutive retries allowed within a given time period.

Funneling access through central entry

The platform’s after-hours reader groups allow security officers to funnel access through a central entry point, for example when disabling all but a single, central entry point in an office building after 5 p.m. Once the cardholder has passed through the central entry point and has been visually identified by the security officer, the cardholder can access specific areas within the building according to his/her access privileges, ensuring that only those with special clearances gain access to specific areas after normal hours.

The platform’s after-hours reader groups allow security officers to funnel access through a central entry point

“The newest version of the C•CURE 9000 includes features that are invaluable to airports, government buildings and other large-scale facilities because they automate processes, and provide process and procedure accountability for meeting compliance standards,” said Jason Ouellette, Global Product Line Director, Access Control, Tyco Security Products. “The v2.60 release can also improve operational efficiency by moving administrative tasks, such as adding new card holders, to specific individuals who can use their mobile devices to access the system.”

Automating process

Expiring clearances allow end users to assign clearances with expiration dates to individuals for multiple doors/readers, while random screening automates screening selection for airports and other high security areas. Additionally, the two-person and team rule for entry occupancy feature, which is ideal for R&D and government facilities, restricts access to sensitive areas to specific combinations of card holders and local time zone awareness for monitoring and reporting.

Included in the latest version of C•CURE 9000 is a new version of the C•CURE 9000 Web Client that provides remote access to C•CURE 9000 directly from a computer with an Internet browser. The new web client is based on the RESTful protocol and true web services, and includes a new look GUI and new installation process.

Download PDF Version

Follow us for latest editorial and commercial opportunities
People mentioned in this article

Jason Ouellette
Jason Ouellette


Please rate this article


Related videos
Featured White Paper

What Do I Need to Know to Successfully Deploy Mobile Access?

This white paper discusses what you need to know in preparation to deploy a mobile access solution. Using a mobile device to gain access to buildings is not only about solving a particular problem; it's also about doing things better.

Confidence and education in the use of contactless applications and technologies, such as Near Field Communications (NFC) and Bluetooth, are continuously growing. In the era of mobility and cloud computing, companies are increasingly concerned about the security and protection of their physical environment. Correctly implemented, mobile access has the potential to revolutionise the way we open doors.

HID have produced this guide to mobile access configuration to explore the underlying technologies which enable mobile access and discuss what you need to know to implement mobile access control.


See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition