SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6

Electronic access control

Electronic access control

Software House Electronic access control

Software House PSX-D8P eight output distribution board
Software House PSX-D8P eight output distribution board

Multiple outputs for auxiliary power distribution or direct lock control and additional accessory power distribution modules Dual Buss Architecture for field selectable Buss 1 or Buss 2 output Fire Alarm Interface (FAI) for egress lock control when used with the DC2 output of a PSX power supply Configurable fail-safe, fail-secure modes of operation when connected to an PSX power supply Multiple modules can be daisy chained to add additional outputs Snap-in style mounting standoffs with fast-on connect cables for easy field installation Visual Indicators - green LED per output RoHS compliant, lead free design

Software House CC9-AWF-MD access management workflow web-based portal
Software House CC9-AWF-MD access management workflow web-based portal

Includes a total of 1,000 unique Approvers/Requesters Sends access requests to the owner of a specified clearance directly thereby streamlining the process Configure multiple levels of approvers and minimum number of approvers per level Define approval hierarchy Specify recurring clearance review activity Escalate missed clearance reviews Reduce workload on security personnel Empower cardholders to make access requests Entrust clearance owners with the control to approve, deny and revoke clearances Maintain security by turning company policies into automated workflows Comprehensive log for review and audit purposes Optionally configure doors to automatically initiate requests upon “access denied” events

Software House CC9-AWF10KPK access management workflow
Software House CC9-AWF10KPK access management workflow

Additional 10,000 Approvers/Requesters Sends access requests to the owner of a specified clearance directly thereby streamlining the process Configure multiple levels of approvers and minimum number of approvers per level Define approval hierarchy Specify recurring clearance review activity Escalate missed clearance reviews Reduce workload on security personnel Empower cardholders to make access requests Entrust clearance owners with the control to approve, deny and revoke clearances Maintain security by turning company policies into automated workflows Comprehensive log for review and audit purposes Optionally configure doors to automatically initiate requests upon “access denied” events

Software House RM1-PI26 proximity reader
Software House RM1-PI26 proximity reader

Combines HID Indala ASP® proximity technology with the advanced electronics Provides two supervised inputs and two control point outputs Three high-intensity LEDs (red, amber, and green) indicate system conditions Operates in star or multi-drop configuration to support diverse security needs Built-in tamper switch and security screws protect reader electronics Rugged design suitable for interior or exterior environment

Software House CC9-AWF-SM access management workflow web-based portal
Software House CC9-AWF-SM access management workflow web-based portal

Includes a total of 1,000 unique Approvers/Requesters Sends access requests to the owner of a specified clearance directly thereby streamlining the process Configure multiple levels of approvers and minimum number of approvers per level Define approval hierarchy Specify recurring clearance review activity Escalate missed clearance reviews Reduce workload on security personnel Empower cardholders to make access requests Entrust clearance owners with the control to approve, deny and revoke clearances Maintain security by turning company policies into automated workflows Comprehensive log for review and audit purposes Optionally configure doors to automatically initiate requests upon “access denied” events

Software House CC9-AWF-LG access management workflow web-based portal
Software House CC9-AWF-LG access management workflow web-based portal

Includes a total of 1,000 unique Approvers/Requesters Sends access requests to the owner of a specified clearance directly thereby streamlining the process Configure multiple levels of approvers and minimum number of approvers per level Define approval hierarchy Specify recurring clearance review activity Escalate missed clearance reviews Reduce workload on security personnel Empower cardholders to make access requests Entrust clearance owners with the control to approve, deny and revoke clearances Maintain security by turning company policies into automated workflows Comprehensive log for review and audit purposes Optionally configure doors to automatically initiate requests upon “access denied” events

Software House STAR008-4URM rack mount door controller
Software House STAR008-4URM rack mount door controller

Leverages 4-post IT racks or standard 2-post Telco racks Includes all the necessary components required to control up to 16 doors, in one enclosure Supports 8 RM readers with integral lock power Front panel LCD and LEDs enable quick diagnostics and troubleshooting Hinged cover provides easy access to diagnostic port Dual network LAN ports offer redundant network connection Fully compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats including PIV II extended formats

Software House STAR016-4URM rack mount door controller
Software House STAR016-4URM rack mount door controller

Leverages 4-post IT racks or standard 2-post Telco racks Includes all the necessary components required to control up to 16 doors, in one enclosure Supports 16 RM readers with integral lock power Front panel LCD and LEDs enable quick diagnostics and troubleshooting Hinged cover provides easy access to diagnostic port Dual network LAN ports offer redundant network connection Fully compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats including PIV II extended formats

Software House STAR008-4UW rack mount door controller
Software House STAR008-4UW rack mount door controller

Leverages 4-post IT racks or standard 2-post Telco racks Includes all the necessary components required to control up to 16 doors, in one enclosure Supports 8 Wiegand readers with integral lock power Front panel LCD and LEDs enable quick diagnostics and troubleshooting Hinged cover provides easy access to diagnostic port Dual network LAN ports offer redundant network connection Fully compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats including PIV II extended formats

Software House SWH-TST-100-OUTK touchscreen terminal
Software House SWH-TST-100-OUTK touchscreen terminal

4.3” capacitive touchscreen provides ideal user experience Outdoor kit with gaskets Intuitive icon-driven user interface for both access control and intrusion Encrypted RS-485 communications Easily arm and disarm intrusion zones using card, PIN, or combination Built-in motion sensor saves screen life Menu-driven keypad commands for custom operations Compatible with all iSTAR door controllers Supports Software House RM and smart reader protocols Supports MIFARE, DESFire, EV1 and EV2, HID iCLASS, iCLASS SE, iCLASS Seos, and HID Proximity card technologies Prioritise and enable/disable card technologies to read Future-proof design allows users to add features as they become available Firmware download includes read head firmware updates

Software House STAR008-2UW rack mount door controller
Software House STAR008-2UW rack mount door controller

Saves wall space and lowers installation costs Leverages standard IT server racks Controls 8 Wiegand readers using space-saving 2U enclosure, 16 inputs and 8 outputs included Patented design allows fast field wiring using quick connects Front panel LCD and LEDs enable quick diagnostics and troubleshooting Industrial handles and slide rails ensure easy installation Hinged cover provides easy access to diagnostic port Dual network LAN ports for redundant network connection Compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats, including FIPS 201 extended formats, for a highly secure, flexible solution

Software House SWH-4130-G-26B multi-technology reader
Software House SWH-4130-G-26B multi-technology reader

26-bit format Triple-receiver design allows simultaneous reading of HID® proximity cards, Indala® proximity cards, and contactless smart cards Reads more than 10 different types and formats of proximity cards and contactless smart cards, including most common Indala formats Download new functionality or enhancements for a future-proof solution Encryption and custom keys for secure transmission of data Indoor/outdoor use Built-in tamper switch provides secure installation

Software House PSX-C8P eight output lock module
Software House PSX-C8P eight output lock module

Multiple outputs for direct lock control and additional accessory power distribution modules Dual Buss Architecture for field selectable Buss 1 or Buss 2 output Colour coded by function configuration jumpers for ease of programming Configurable fail-safe, fail-secure, and dry contact modes of operation Fire Alarm Interface (FAI) when used with an PSX power supply Fault detection and reporting to host power supply Multiple modules can be daisy chained to add additional outputs Snap-in style mounting standoffs with fast-on connect cables for easy field installation Visual LED Indicators - yellow fault, green per output RoHS compliant, lead free design

Software House STAR016-2URM rack mount door controller
Software House STAR016-2URM rack mount door controller

Saves wall space and lowers installation costs Leverages standard IT server racks Controls 16 RM readers using space-saving 2U enclosure, 32 inputs and 16 outputs included Patented design allows fast field wiring using quick connects Front panel LCD and LEDs enable quick diagnostics and troubleshooting Industrial handles and slide rails ensure easy installation Hinged cover provides easy access to diagnostic port Dual network LAN ports for redundant network connection Compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats, including FIPS 201 extended formats, for a highly secure, flexible solution

Software House SWH-TST-100 touchscreen terminal
Software House SWH-TST-100 touchscreen terminal

4.3” capacitive touchscreen provides ideal user experience Intuitive icon-driven user interface for both access control and intrusion Encrypted RS-485 communications Easily arm and disarm intrusion zones using card, PIN, or combination Built-in motion sensor saves screen life Menu-driven keypad commands for custom operations Compatible with all iSTAR door controllers Supports Software House RM and smart reader protocols Supports MIFARE, DESFire, EV1 and EV2, HID iCLASS, iCLASS SE, iCLASS Seos, and HID Proximity card technologies Prioritise and enable/disable card technologies to read Future-proof design allows users to add features as they become available Firmware download includes read head firmware updates

Software House SWH-4130-G-37B multi-technology reader
Software House SWH-4130-G-37B multi-technology reader

SWH 37-bit format Triple-receiver design allows simultaneous reading of HID® proximity cards, Indala® proximity cards, and contactless smart cards Reads more than 10 different types and formats of proximity cards and contactless smart cards, including most common Indala formats Download new functionality or enhancements for a future-proof solution Encryption and custom keys for secure transmission of data Indoor/outdoor use Built-in tamper switch provides secure installation

Software House SWH-4130-G multi-technology reader
Software House SWH-4130-G multi-technology reader

ACC 37-bit format Triple-receiver design allows simultaneous reading of HID® proximity cards, Indala® proximity cards, and contactless smart cards Reads more than 10 different types and formats of proximity cards and contactless smart cards, including most common Indala formats Download new functionality or enhancements for a future-proof solution Encryption and custom keys for secure transmission of data Indoor/outdoor use Built-in tamper switch provides secure installation

Software House STAR008-2URM rack mount door controller
Software House STAR008-2URM rack mount door controller

Saves wall space and lowers installation costs Leverages standard IT server racks Controls 8 RM readers using space-saving 2U enclosure, 16 inputs and 8 outputs included Patented design allows fast field wiring using quick connects Front panel LCD and LEDs enable quick diagnostics and troubleshooting Industrial handles and slide rails ensure easy installation Hinged cover provides easy access to diagnostic port Dual network LAN ports for redundant network connection Compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats, including FIPS 201 extended formats, for a highly secure, flexible solution

Software House PSX-WPISU16E8SN pre-wired system
Software House PSX-WPISU16E8SN pre-wired system

Wired for 16 reader iStar Ultra, Panduit, Network Connected, 16 Aux Outputs Provides uniform installations across an enterprise One enclosure, one AC drop, network-ready Capable of integrating with C-CURE 9000 Enables operational efficiencies and global standards UL & CE certified Customised design and high reliability operation

Software House STAR016-4UW rack mount door controller
Software House STAR016-4UW rack mount door controller

Leverages 4-post IT racks or standard 2-post Telco racks Includes all the necessary components required to control up to 16 doors, in one enclosure Supports 16 Wiegand readers with integral lock power Front panel LCD and LEDs enable quick diagnostics and troubleshooting Hinged cover provides easy access to diagnostic port Dual network LAN ports offer redundant network connection Fully compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats including PIV II extended formats

Software House RM2-P126 proximity reader
Software House RM2-P126 proximity reader

Combines HID Indala ASP® proximity technology with the advanced electronics Provides two supervised inputs and two control point outputs Three high-intensity LEDs (red, amber, and green) and keypad audio feature indicate system conditions Operates in star or multi-drop configuration to support diverse security needs Built-in tamper switch and security screws protect reader electronics Rugged design suitable for interior or exterior environment

Software House SWH-4130-37B black multi-technology reader
Software House SWH-4130-37B black multi-technology reader

SWH 37-bit format Triple-receiver design allows simultaneous reading of HID® proximity cards, Indala® proximity cards, and contactless smart cards Reads more than 10 different types and formats of proximity cards and contactless smart cards, including most common Indala formats Download new functionality or enhancements for a future-proof solution Encryption and custom keys for secure transmission of data Indoor/outdoor use Built-in tamper switch provides secure installation

Software House RM2L-PI26 proximity reader
Software House RM2L-PI26 proximity reader

Combines HID Indala ASP® proximity technology with the advanced electronics Keypad and backlit LCD can be utilised to provide system status and duress capabilities Provides two supervised inputs and two control point outputs Three high-intensity LEDs (red, amber, and green) indicate system conditions Operates in star or multi-drop configuration to support diverse security needs Built-in tamper switch and security screws protect reader electronics Rugged design suitable for interior or exterior environment

Software House GSTAR-ACM-SE-4U cyber-hardened network door controller
Software House GSTAR-ACM-SE-4U cyber-hardened network door controller

ACM board in 4U rack mount enclosure Supports up to eight Wiegand, RM or OSDP readers, 16 supervised inputs, and 8 outputs dry-configured Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Software House SWH-4130-26B black multi-technology reader
Software House SWH-4130-26B black multi-technology reader

26-bit format Triple-receiver design allows simultaneous reading of HID® proximity cards, Indala® proximity cards, and contactless smart cards Reads more than 10 different types and formats of proximity cards and contactless smart cards, including most common Indala formats Download new functionality or enhancements for a future-proof solution Encryption and custom keys for secure transmission of data Indoor/outdoor use Built-in tamper switch provides secure installation

Software House RM2L-MP magnetic stripe reader
Software House RM2L-MP magnetic stripe reader

Utilises flexible and versatile card reader technology Supports high and low coercivity cards encoded on Track 2 Gives option of using cards that have been magnetically encoded for other applications Keypad and backlit LCD can be utilised to provide system status and duress capabilities Provides two supervised inputs and two control point outputs Three high-intensity LEDs (red, amber, and green) indicate system conditions Operates in star or multi-drop configuration to support diverse security needs Built-in tamper switch and security screws protect reader electronics Rugged design suitable for interior or exterior environment

Software House USTAR-LT16-MB network-ready door controller
Software House USTAR-LT16-MB network-ready door controller

Supports 16 readers, board only Powerful IP-ready door controller Hardened Linux embedded OS for improved security and scalability Onboard 256-bit AES network encryption Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Native intrusion zone functionality Includes global anti-passback and advanced peer-to-peer clustering Manages up to 500,000 cardholders in local memory

Software House STAR016-2UW rack mount door controller
Software House STAR016-2UW rack mount door controller

Saves wall space and lowers installation costs Leverages standard IT server racks Controls 16 Wiegand readers using space-saving 2U enclosure, 32 inputs and 16 outputs included Patented design allows fast field wiring using quick connects Front panel LCD and LEDs enable quick diagnostics and troubleshooting Industrial handles and slide rails ensure easy installation Hinged cover provides easy access to diagnostic port Dual network LAN ports for redundant network connection Compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats, including FIPS 201 extended formats, for a highly secure, flexible solution

  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
Related white papers
One system, one card

One system, one card

Download
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Related articles
TDSi by Hirsch: Reinventing UK access control

TDSi by Hirsch: Reinventing UK access control

HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

Securitas Technology acquires Sonitrol Ft. Lauderdale

Securitas Technology acquires Sonitrol Ft. Lauderdale

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec