Check out our special report on casino security
Software House iSTAR Pro 64 MB network-ready door controller
Technical Specification
- Make: Software House
- Model code: iSTAR Pro 64 MB
- Series: iSTAR Pro Series
- Controller Type: Networkable
- No of Cardholders: 500,000
Powerful 8 or 16 reader network-ready controller Expanded memory for up to 500,000 cardholders Global and local anti-passback with occupancy control Embedded intrusion zone functionality Retrofits possible with apC adapter plate Onboard battery backup and storage of configuration data using nonvolatile memory Supports both direct readers and RS-485 readers for greater coverage LCD provides important controller status and diagnostics information Supports multiple cards per cardholder and multiple formats for a highly secure, flexible solution Great solution for Universities, Healthcare, and Transportation applications Compatible with C•CURE 9000 and C•CURE 800/8000
Read more| Make | Software House |
|---|---|
| Manufacturer | Software House |
| Category | Access Control>Access control controllers |
| Model code | iSTAR Pro 64 MB |
| Series | iSTAR Pro Series |
| Controller Type | Networkable |
| No of Cardholders | 500,000 |
| Offline Capabilities | Yes |
| Networkable | Yes |
| Onboard No/Type of Inputs / Outputs | 32 Supervised Inputs, 16 Relay Outputs |
| Universal / Wiegand Reader Interface | Yes |
| Reader Max. Distance m | 150 ~ 1219 |
| Physical Specifications |
Dimensions mm: 616 x 419 x 102 Weight g: 10,600 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 50 C (32 ~ 122 F) Operating Humidity %: 5 ~ 95 |
| Additional info |
|
You might be interested in these products
Related Whitepapers
Open credential standards and the impact on physical access control
System design considerations to optimize physical access control
Maximising enterprise security systems in the cloud
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

