Check out our special report on casino security
Software House iSTAR Ultra SE - Pro mode network-ready door controller
Technical Specification
- Make: Software House
- Model code: iSTAR Ultra SE - Pro mode
- Controller Type: Networkable
- No of Cardholders: 500,000
- Networkable: Yes
Powerful network-ready door controller for up to 32 readers (16 from ACMs) Dedicated DIP switch allows to go from “Pro mode” for use with C•CURE 800/8000 and C•CURE 9000 to “Ultra mode” for use with C•CURE 9000 Dual GigE network ports for redundant network operation Hardened Linux embedded OS for improved security and scalability Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Includes global anti-passback and advanced peer-to-peer clustering Native intrusion zone functionality Manages up to 500,000 cardholders in local memory Socketed relays improve serviceability Great solution for enterprise and government installations
Read more| Make | Software House |
|---|---|
| Manufacturer | Software House |
| Category | Access Control>Access control controllers |
| Model code | iSTAR Ultra SE - Pro mode |
| Controller Type | Networkable |
| No of Cardholders | 500,000 |
| Networkable | Yes |
| Communication Type | RS485 |
| Onboard No/Type of Inputs / Outputs | 16 Supervised Inputs, 8 Relay Outputs |
| Universal / Wiegand Reader Interface | Yes |
| Reader Max. Distance m | 150 ~ 1219 |
| Electrical Specifications | Voltage: 12 V DC |
| Environmental Specifications |
Operating Temp oC: 0 ~ 50 C (32 ~ 122 F) Operating Humidity %: 5 ~ 95 |
| Additional info |
|
You might be interested in these products
Related Whitepapers
Open credential standards and the impact on physical access control
System design considerations to optimize physical access control
Maximising enterprise security systems in the cloud
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

