Software House USTARVID-804-1 access control and video appliance

Technical Specification

Features:
  • Make: Software House
  • Model code: USTARVID-804-1
  • Series: iSTAR Ultra Video
  • Kits: Yes
  • Standalone/ Networked/ PC: Networked
Read more
Additional info:

Controls 8 doors and 4 IP cameras in one small, low-cost appliance Managed by remote integrated C•CURE 9000/victor application Scalable to thousands of sites Intuitive web-based start-up wizard with camera auto-discovery reduces commissioning time Local video storage and caching Unparalleled video stream management with full transcoding functionality Powerful video analytics save time; improve situational awareness Supports ONVIF Profile S Manages up to 500,000 cardholders in local memory Native intrusion zone functionality FIPS 197 AES 256 network encryption

Read more
Make Software House
Manufacturer Software House
Category Access Control>Access control systems & kits
Model code USTARVID-804-1
Series iSTAR Ultra Video
Kits Yes
Standalone/ Networked/ PC Networked
Reader Type Smart Card
Max Doors per System 8 doors/system
c/w Cards, Tags or Fobs Cards
No/ Type of Inputs/ Outputs 32 Inputs, 16 Outputs
Environmental Specifications Operating Temperature oC: 0 ~ 49 C (32 ~ 120 F)
Electrical Specifications Voltage: 19 V DC, 115 / 230 V AC
Physical Specifications Dimensions mm: 115 x 111 x 49
Weight g: 1,400
Additional info
  • Controls 8 doors and 4 IP cameras in one small, low-cost appliance
  • Managed by remote integrated C•CURE 9000/victor application
  • Scalable to thousands of sites
  • Intuitive web-based start-up wizard with camera auto-discovery reduces commissioning time
  • Local video storage and caching
  • Unparalleled video stream management with full transcoding functionality
  • Powerful video analytics save time; improve situational awareness
  • Supports ONVIF Profile S
  • Manages up to 500,000 cardholders in local memory
  • Native intrusion zone functionality
  • FIPS 197 AES 256 network encryption
Download PDF version Download PDF version

Related Whitepapers

The security challenges of data centers

The critical importance of Trusted Execution Environment in access control

The critical role of access control in K-12 school security

Quick poll
What's the primary benefit of integrating access control with video surveillance?