SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6

Electronic access control

Electronic access control

Software House Electronic access control

Software House CC9-2FA-100 C•CURE 9000 Two Factor Authentication, 100 readers
Software House CC9-2FA-100 C•CURE 9000 Two Factor Authentication, 100 readers

Two Factor Authentication, 100 readers Verify identities with on-demand two-factor authentication Auto-enroll personnel from C•CURE 9000 Self-registration via mobile app download enhances user experience Supported by iSTAR controllers - no hardware replacement or retrofits Easy to deploy and manage Lower cost alternative to biometric readers and smart cards

Software House PSX-150-E1-D8P single voltage power system
Software House PSX-150-E1-D8P single voltage power system

With eight output PTC Provides uninterrupted back-up power for iSTAR and apC/8X door controllers Supervision of AC fault, system fault, ground fault, reverse battery, fire alarm activation Switched and resettable outputs Network communication interface option Intelligent battery charging and battery state monitoring Dual rate charging restores battery sets from 4Ah to 80Ah Reverse polarity, overcurrent, and thermal overload protection 4.5” enclosure depth accommodates large battery sets RoHS compliant, lead free, high efficiency design

Software House CC9-2FA-10 C•CURE 9000 Two Factor Authentication, 10 readers
Software House CC9-2FA-10 C•CURE 9000 Two Factor Authentication, 10 readers

Two Factor Authentication, 10 readers Verify identities with on-demand two-factor authentication Auto-enroll personnel from C•CURE 9000 Self-registration via mobile app download enhances user experience Supported by iSTAR controllers - no hardware replacement or retrofits Easy to deploy and manage Lower cost alternative to biometric readers and smart cards

Software House CC9-2FA-25 C•CURE 9000 Two Factor Authentication, 25 readers
Software House CC9-2FA-25 C•CURE 9000 Two Factor Authentication, 25 readers

Two Factor Authentication, 25 readers Verify identities with on-demand two-factor authentication Auto-enroll personnel from C•CURE 9000 Self-registration via mobile app download enhances user experience Supported by iSTAR controllers - no hardware replacement or retrofits Easy to deploy and manage Lower cost alternative to biometric readers and smart cards

Software House GSTAR-PRO-SE08 cyber-hardened network door controller
Software House GSTAR-PRO-SE08 cyber-hardened network door controller

Includes General Controller Module, 1 Access Control Module Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Software House RM-DCM-2 door control module
Software House RM-DCM-2 door control module

Full-featured local door control module lowers wiring costs Complete set of inputs and outputs to control one door Flexible control options for reader LEDs and beep patterns Easily expandable Status LEDs on inputs and outputs for quick troubleshooting Built-in tamper switch provides secure installation Plug-in screw terminals reduce installation time

Software House ESTAR002 two-reader IP edge access door controller
Software House ESTAR002 two-reader IP edge access door controller

With enclosure Controls and powers all access control devices at the door to minimise installation costs Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localised access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Software House iSTAR Pro 64 MB network-ready door controller
Software House iSTAR Pro 64 MB network-ready door controller

Powerful 8 or 16 reader network-ready controller Expanded memory for up to 500,000 cardholders Global and local anti-passback with occupancy control Embedded intrusion zone functionality Retrofits possible with apC adapter plate Onboard battery backup and storage of configuration data using nonvolatile memory Supports both direct readers and RS-485 readers for greater coverage LCD provides important controller status and diagnostics information Supports multiple cards per cardholder and multiple formats for a highly secure, flexible solution Great solution for Universities, Healthcare, and Transportation applications Compatible with C•CURE 9000 and C•CURE 800/8000 

Software House CC9-VME-LG enhanced visitor management option for large systems
Software House CC9-VME-LG enhanced visitor management option for large systems

Easily manage visitor life cycle with minimal training using Receptionist Portal Register, badge, and track visitors, and manage scheduled appointments with reporting accountability Capture and store visitor information with appointment details for policy compliance Supports UDFs configured for health screening questions during check-in Flexible software check in/check out at front desk or automated at access control points Customise data templates for fast appointment setup and visitor processing Email calendar file invites to hosts and visitors with appointment details and policy attachments Notify hosts by email when visitors check-in and remind visitors of unreturned temporary credentials

Software House CC9-2FA-1 C•CURE 9000 Two Factor Authentication, one reader
Software House CC9-2FA-1 C•CURE 9000 Two Factor Authentication, one reader

Two Factor Authentication, one reader Verify identities with on-demand two-factor authentication Auto-enroll personnel from C•CURE 9000 Self-registration via mobile app download enhances user experience Supported by iSTAR controllers - no hardware replacement or retrofits Easy to deploy and manage Lower cost alternative to biometric readers and smart cards

Software House CC9-VME-SM enhanced visitor management option for small systems
Software House CC9-VME-SM enhanced visitor management option for small systems

Easily manage visitor life cycle with minimal training using Receptionist Portal Register, badge, and track visitors, and manage scheduled appointments with reporting accountability Capture and store visitor information with appointment details for policy compliance Supports UDFs configured for health screening questions during check-in Flexible software check in/check out at front desk or automated at access control points Customise data templates for fast appointment setup and visitor processing Email calendar file invites to hosts and visitors with appointment details and policy attachments Notify hosts by email when visitors check-in and remind visitors of unreturned temporary credentials

Software House SWH-4130 black multi-technology reader
Software House SWH-4130 black multi-technology reader

ACC 37-bit format Triple-receiver design allows simultaneous reading of HID® proximity cards, Indala® proximity cards, and contactless smart cards Reads more than 10 different types and formats of proximity cards and contactless smart cards, including most common Indala formats Download new functionality or enhancements for a future-proof solution Encryption and custom keys for secure transmission of data Indoor/outdoor use Built-in tamper switch provides secure installation

Software House SSVR3-16 access control appliance
Software House SSVR3-16 access control appliance

Supports 16 readers Ready to go with pre-installed C•CURE 9000 software and intuitive wizard for easy configuration Includes pre-configured database of readers, doors, controllers, and other standard objects to reduce setup time Can operate as a satellite application server (SAS) in an enterprise environment 256GB solid state drive (SSD) provides enhanced system reliability Intuitive C•CURE 9000 Web Client simplifies operator training Health dashboard to monitor network bandwidth, memory, and other important system functionality

Software House CC9-VME-MD enhanced visitor management option for medium systems
Software House CC9-VME-MD enhanced visitor management option for medium systems

Easily manage visitor life cycle with minimal training using Receptionist Portal Register, badge, and track visitors, and manage scheduled appointments with reporting accountability Capture and store visitor information with appointment details for policy compliance Supports UDFs configured for health screening questions during check-in Flexible software check in/check out at front desk or automated at access control points Customise data templates for fast appointment setup and visitor processing Email calendar file invites to hosts and visitors with appointment details and policy attachments Notify hosts by email when visitors check-in and remind visitors of unreturned temporary credentials

Software House C-CURE 9000 Enterprise access control software
Software House C-CURE 9000 Enterprise access control software

C•CURE 9000 Enterprise provides an advanced distributed architecture for enterprise scalability C•CURE 9000 Enterprise gives corporate security personnel and IT managers central control over the entire system, while each local facility maintains independent control of its individual operation Its power gives system administrators at the main facility the ability to configure and monitor all locations from that single site It also allows to simultaneously monitor alarms from multiple facilities from one convenient workstation

Software House RM2L-4000 multi-technology reader
Software House RM2L-4000 multi-technology reader

Reads both proximity and smart cards, providing an ideal solution for customers looking to transition from proximity to a more secure smart card solution Offers enhanced security through MIFARE® and DESFire®, EV1/EV2 encryption, and is compatible with nearly all major card formats in the industry, including ISO 14443 A/B, ISO 15693, MIFARE, DESFire, FIPS 201 PIV FASC-N read, and most 125 KHz formats (HID and CASI® ProxLite) Keypad and backlit LCD can be utilised to provide system status and duress capabilities Provides two supervised inputs and two control point outputs Three high-intensity LEDs (red, amber, and green) indicate system conditions Operates in star or multi-drop configuration to support diverse security needs Built-in tamper switch and security screws protect reader electronics Rugged design suitable for interior or exterior environment

Software House C-CURE 9000 v2.90 access control software
Software House C-CURE 9000 v2.90 access control software

OSDP support for reader to panel communications on iSTAR Ultra Series controllers Supports up to 5,000 readers per single server and 40 satellite application server scalability for Enterprise systems Access to C•CURE 9000 from any internet browser with C•CURE Web Administer and monitor C•CURE 9000 from mobile device with C•CURE Go Software House Connected Partner Program for standards-based integrations Part of the Cyber Protection Program to reduce the risk of vulnerabilities Video Smart Search and Analytic Search for fast video investigation Video Clip Management to customise, store and automate video footage Save and quickly recall frequently visited tabs and objects with the new CCURE 9000 dashboard

Software House ESTAR002-MB two-reader IP edge access door controller
Software House ESTAR002-MB two-reader IP edge access door controller

Motherboard only Controls and powers all access control devices at the door to minimise installation costs Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localised access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Software House RM2L-SE multiCLASS reader
Software House RM2L-SE multiCLASS reader

Reads latest HID iCLASS SE and Seos cards Features the HID SE3200 multi-technology read head, allowing card reads from HID Proximity, iCLASS, iCLASS SE and Seos cards  simultaneously Provides LCD and keypad support for arm/disarm functionality in proprietary burglar alarm installations, per UL 1076 Provides two supervised inputs and two control point outputs Three high-intensity LEDs (red, amber, and green) indicate system conditions Operates in star or multi-drop configuration to support diverse security needs Built-in tamper switch and security screws protect reader electronics Rugged design suitable for interior or exterior environment

Software House RM-CAN small metal enclosure
Software House RM-CAN small metal enclosure

A small metal enclosure with tamper switch Up to one input or output module

Software House SSVR3-32 access control appliance
Software House SSVR3-32 access control appliance

Supports 32 readers Ready to go with pre-installed C•CURE 9000 software and intuitive wizard for easy configuration Includes pre-configured database of readers, doors, controllers, and other standard objects to reduce setup time Can operate as a satellite application server (SAS) in an enterprise environment 256GB solid state drive (SSD) provides enhanced system reliability Intuitive C•CURE 9000 Web Client simplifies operator training Health dashboard to monitor network bandwidth, memory, and other important system functionality

Software House GSTAR004 IP edge access door controller
Software House GSTAR004 IP edge access door controller

iSTAR Edge G2 door controller with metal enclosure, supports four readers Stand-alone IP edge access controller with local database of up to 1,000,000 cardholders Controls and powers all access control devices at the door to minimise installation costs Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Advanced access control feature set including anti-passback, peer-to-peer clustering and local event logic Dual GigE Network ports with IPv6, DHCP and 802.1X support Supports OSDP Secure Channel for encrypted, two-way reader communications Supports embedded High Assurance FICAM operation without additional third-party hardware

Software House AS0073-CSI input module
Software House AS0073-CSI input module

Provides cost-effective expansion of input and output capacity Compatible with full range of Software House iSTAR and apC access control panels Locate modules up to 1,220 m (4,000 ft) away from controllers using flexible two-wire RS-485 RM bus Reduces length of sensor and control wiring to save installation costs I8-CSI, configurable supervised input model, allows use of existing input wiring without changing end-of-line (EOL) resistors Three status LEDs per input (red/yellow/green) and one per output enable quick diagnostics and troubleshooting Small, modular size requires minimal panel space Dedicated tamper input included

Software House IP-ACM2A-MB 2-reader Ethernet door module
Software House IP-ACM2A-MB 2-reader Ethernet door module

Board only Cost-effective IP access control module Up to 32 IP-ACMs per iSTAR Ultra and iSTAR Ultra SE, and up to 8 per iSTAR Ultra LT Convenient second port for biometric reader or efficient network diagnostics Wet lock outputs provide up to 0.75A each for ability to power most lock types Highly distributed architecture PoE or PoE Plus 10/100/GigE connectivity AES-256 network encryption Configurable offline mode Easy setup with static IP or DHCP Small, ‘office-ready” enclosure design Full duplex RS-485 on board to leverage future technology Selectable “wet” and dry output relays OSDP support fosters device interoperability Supports TLS 1.2 and 802.1X secure network protocols for protection against the threat of cyber attacks

Software House GSTAR016-SE cyber-hardened network door controller
Software House GSTAR016-SE cyber-hardened network door controller

With enclosure, PSU Powerful cyber-hardened network door controller for 16 readers Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Software House iSTAR Ultra SE - Ultra mode network-ready door controller
Software House iSTAR Ultra SE - Ultra mode network-ready door controller

Powerful network-ready door controller for up to 32 readers (16 from ACMs) Dedicated DIP switch allows to go from “Pro mode” for use with C•CURE 800/8000 and C•CURE 9000 to “Ultra mode” for use with C•CURE 9000 Dual GigE network ports for redundant network operation Hardened Linux embedded OS for improved security and scalability Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Includes global anti-passback and advanced peer-to-peer clustering Native intrusion zone functionality Manages up to 500,000 cardholders in local memory Socketed relays improve serviceability Dedicated input for fire alarm interlock overrides door locks during fire conditions Onboard 256-bit AES network encryption Great solution for enterprise and government installations

Software House GSTAR004-MBP IP edge access door controller
Software House GSTAR004-MBP IP edge access door controller

iSTAR Edge G2 board only, supports four readers Stand-alone IP edge access controller with local database of up to 1,000,000 cardholders Controls and powers all access control devices at the door to minimise installation costs Power over Ethernet (PoE) module features PoE+, with enough power for two doors and associated devices Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Advanced access control feature set including anti-passback, peer-to-peer clustering and local event logic Dual GigE Network ports with IPv6, DHCP and 802.1X support Supports OSDP Secure Channel for encrypted, two-way reader communications Supports embedded High Assurance FICAM operation without additional third-party hardware

Software House PSX-75-E1-D8P single voltage power system
Software House PSX-75-E1-D8P single voltage power system

With eight output PTC Provides uninterrupted back-up power for iSTAR and apC/8X door controllers Supervision of AC fault, system fault, ground fault, reverse battery, fire alarm activation Switched and resettable outputs Network communication interface option Intelligent battery charging and battery state monitoring Dual rate charging restores battery sets from 4Ah to 80Ah Reverse polarity, overcurrent, and thermal overload protection 4.5” enclosure depth accommodates large battery sets RoHS compliant, lead free, high efficiency design

  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
Related white papers
One system, one card

One system, one card

Download
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Related articles
TDSi by Hirsch: Reinventing UK access control

TDSi by Hirsch: Reinventing UK access control

HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

Securitas Technology acquires Sonitrol Ft. Lauderdale

Securitas Technology acquires Sonitrol Ft. Lauderdale

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec