iAM from PCSC - next generation integrated alarm & access management system

Product Profile

PCSC launched the first all-in-one system with 21 direct connect zones and automatic deactivation of zone groups by authorized cardholders, providing a system with virtually no false alarms on entry. 

Benefiting from PCSC's 21 years of experience in access control, the iAM offers features and functions not available in comparable systems.  Service and user programming is accomplished with a self-loading, easy to use Windows based software application, LiNC-Ez.  Most parameters, such as cardholders, zone groups, time periods and holidays are factory defaulted – the only custom setting required is the central station phone number.  Utilizing PCSC's innovative high security 5 State Alarm Monitoring logic, the iAM provides the most accurate alarm monitoring for intrusion and access control devices.

Additional system features include guard tour management - capable of recognizing a guard and notifying the central station when the special guard card is presented at a customer's site, but access will not be granted unless the system is in an alarm state.

Alarm monitoring features include: 

21 Alarm Zones, automatic alarm zone group deactivation by cardholder, automatic daylight savings control, automatic holiday control, 99 user definable zone groups, 99 user defined PIN (4 or 5 digits), supervised bell output, supervised enclosure tamper, contact ID central station communication, user defined zone names, user defined zone groups, user selectable zone state (supervised or non-supervised) and individual zone calibration control.

Read more

Technical Specification

Manufacturer PCSC
Model code iAM
Kits Yes
Standalone/ Networked/ PC Standalone
Reader Type Proximity
Max Doors per Controller 1
c/w Cards, Tags or Fobs Cards
Accessories Intrusion and Access Control System
Additional info iAM™ is an integrated intrusion and access control system provided on one simple controller. A system designed for easy installation, yet capable of meeting some of the most sophisticated security needs. Simple and Automatic, yet can be fully configured by the user. The iAM is so advanced it stands by itself.
Download PDF version