New from Continental Access, a division of Napco Security Technologies Inc., the CICP2100 uniVerse single door controller provides support for two readers on one door, using Power over Ethernet (POE). Used in a CA3000 or CA4K access control security management software environment, the tamper-supervised CICP2100 Power over Ethernet controller supports two readers and/or one low current strike via POE.

CICP2100 uniVerse door controller

Super-fast, the CICP2100 uniVerse features a 54MHz RISC processor and also a 1000 transaction buffer (expandable to 10,000), 256 time schedules, 30,000 access groups, and 5 x100 holidays. For easy and clean mounting nearly anywhere, the compact unit is designed to fit conveniently in a standard double-gang electrical box, and can be used networked with, or in place of, Continental Access’ more traditional expandable Accelaterm or Supertwo controllers and/or integrated Trilogy Networx Wireless PIN/Prox Access Control Locks. It Includes a paintable metal faceplate cover with LED indicator status window, and a connection diagrammed secure self-sleeve, for easiest deployment.

Save

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...