Check out our special report on Artificial Intelligence
Software House CC800-5S-EN Access control software
Technical Specification
- Make: Software House
- Model code: CC800-5S-EN
- Series: C-Cure Series
- Max No. of Doors per System: 64
- No of Cardholders included: 40,000
C•CURE 800 Model 5 System Software Only - ENGLISH includes server software and 3 CCURE Client licenses. C•CURE 800/8000 is a scalable security management solution encompassing complete access control and advanced event monitoring. The system integrates with critical business applications including CCTV and digital video such as the American Dynamics Intellex® digital video management system, visitor management, ERP, HR/time and attendance, and third party devices such as fire alarms, intercoms, burglar and other alarms.
Read more| Make | Software House |
|---|---|
| Manufacturer | Software House |
| Category | Access Control>Access control software |
| Model code | CC800-5S-EN |
| Max No. of Doors per System | 64 |
| No of Cardholders included | 40,000 |
| Reader Types | Proximity |
| No of concurrent PC Operators | 3 operators |
| Communication | TCP/IP |
| Visitor Management | Yes |
| Time & Attendance | Yes |
| Guard Tours | Yes |
| Central / Remote Monitoring | Yes |
| Multiple Tenants / Partitioning | Yes |
| System Requirements | Operating System: Windows® Server 2003, Windows XP Professional |
| Additional info |
C•CURE 800 Model 5 System Software Only - ENGLISH includes server software and 3 CCURE Client licenses. C•CURE 800/8000 is a scalable security management solution encompassing complete access control and advanced event monitoring. The system integrates with critical business applications including CCTV and digital video such as the American Dynamics Intellex® digital video management system, visitor management, ERP, HR/time and attendance, and third party devices such as fire alarms, intercoms, burglar and other alarms. |
You might be interested in these products
Related Whitepapers
Open credential standards and the impact on physical access control
System design considerations to optimize physical access control
Maximising enterprise security systems in the cloud
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

