SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access and Monitoring For Data Centres

    KentixONE – IoT Access and Monitoring For Data Centres

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Voyant Photonics unveils Helium LiDAR platform
    • Zimperium uncovers mobile PDF phishing threats
    • Matrix Comsec wins CII 2025 Women in STEM Award
    • VITEC & Actelis: Revolutionising IPTV for RF facilities
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    Featured
    • Which vertical markets have the greatest growth potential for security?
    • What’s behind (perimeter) door #1?
    • Louvre heist exposes security gaps: How smarter security could have prevented a $100 million theft
    • Why open matters in the age of AI
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Marin Hospital enhances security with eCLIQ access control

    Marin Hospital enhances security with eCLIQ access control

    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6

Intrusion detection

Intrusion detection

Software House Intrusion detection

Software House C-CURE ID badging software
Software House C-CURE ID badging software

Software House C-CURE ID badging software utilises Microsoft .NET guidelines for the GUI which enables to create professional and sophisticated badges.

Software House STAR008-4URM rack mount door controller
Software House STAR008-4URM rack mount door controller

Leverages 4-post IT racks or standard 2-post Telco racks Includes all the necessary components required to control up to 16 doors, in one enclosure Supports 8 RM readers with integral lock power Front panel LCD and LEDs enable quick diagnostics and troubleshooting Hinged cover provides easy access to diagnostic port Dual network LAN ports offer redundant network connection Fully compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats including PIV II extended formats

Software House STAR016-4URM rack mount door controller
Software House STAR016-4URM rack mount door controller

Leverages 4-post IT racks or standard 2-post Telco racks Includes all the necessary components required to control up to 16 doors, in one enclosure Supports 16 RM readers with integral lock power Front panel LCD and LEDs enable quick diagnostics and troubleshooting Hinged cover provides easy access to diagnostic port Dual network LAN ports offer redundant network connection Fully compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats including PIV II extended formats

Software House STAR008-4UW rack mount door controller
Software House STAR008-4UW rack mount door controller

Leverages 4-post IT racks or standard 2-post Telco racks Includes all the necessary components required to control up to 16 doors, in one enclosure Supports 8 Wiegand readers with integral lock power Front panel LCD and LEDs enable quick diagnostics and troubleshooting Hinged cover provides easy access to diagnostic port Dual network LAN ports offer redundant network connection Fully compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats including PIV II extended formats

Software House STAR008-2UW rack mount door controller
Software House STAR008-2UW rack mount door controller

Saves wall space and lowers installation costs Leverages standard IT server racks Controls 8 Wiegand readers using space-saving 2U enclosure, 16 inputs and 8 outputs included Patented design allows fast field wiring using quick connects Front panel LCD and LEDs enable quick diagnostics and troubleshooting Industrial handles and slide rails ensure easy installation Hinged cover provides easy access to diagnostic port Dual network LAN ports for redundant network connection Compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats, including FIPS 201 extended formats, for a highly secure, flexible solution

Software House STAR016-2URM rack mount door controller
Software House STAR016-2URM rack mount door controller

Saves wall space and lowers installation costs Leverages standard IT server racks Controls 16 RM readers using space-saving 2U enclosure, 32 inputs and 16 outputs included Patented design allows fast field wiring using quick connects Front panel LCD and LEDs enable quick diagnostics and troubleshooting Industrial handles and slide rails ensure easy installation Hinged cover provides easy access to diagnostic port Dual network LAN ports for redundant network connection Compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats, including FIPS 201 extended formats, for a highly secure, flexible solution

Software House STAR008-2URM rack mount door controller
Software House STAR008-2URM rack mount door controller

Saves wall space and lowers installation costs Leverages standard IT server racks Controls 8 RM readers using space-saving 2U enclosure, 16 inputs and 8 outputs included Patented design allows fast field wiring using quick connects Front panel LCD and LEDs enable quick diagnostics and troubleshooting Industrial handles and slide rails ensure easy installation Hinged cover provides easy access to diagnostic port Dual network LAN ports for redundant network connection Compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats, including FIPS 201 extended formats, for a highly secure, flexible solution

Software House STAR016-4UW rack mount door controller
Software House STAR016-4UW rack mount door controller

Leverages 4-post IT racks or standard 2-post Telco racks Includes all the necessary components required to control up to 16 doors, in one enclosure Supports 16 Wiegand readers with integral lock power Front panel LCD and LEDs enable quick diagnostics and troubleshooting Hinged cover provides easy access to diagnostic port Dual network LAN ports offer redundant network connection Fully compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats including PIV II extended formats

Software House STAR016-2UW rack mount door controller
Software House STAR016-2UW rack mount door controller

Saves wall space and lowers installation costs Leverages standard IT server racks Controls 16 Wiegand readers using space-saving 2U enclosure, 32 inputs and 16 outputs included Patented design allows fast field wiring using quick connects Front panel LCD and LEDs enable quick diagnostics and troubleshooting Industrial handles and slide rails ensure easy installation Hinged cover provides easy access to diagnostic port Dual network LAN ports for redundant network connection Compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats, including FIPS 201 extended formats, for a highly secure, flexible solution

Software House iSTAR Ultra SE - Pro mode network-ready door controller
Software House iSTAR Ultra SE - Pro mode network-ready door controller

Powerful network-ready door controller for up to 32 readers (16 from ACMs) Dedicated DIP switch allows to go from “Pro mode” for use with C•CURE 800/8000 and C•CURE 9000 to “Ultra mode” for use with C•CURE 9000 Dual GigE network ports for redundant network operation Hardened Linux embedded OS for improved security and scalability Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Includes global anti-passback and advanced peer-to-peer clustering Native intrusion zone functionality Manages up to 500,000 cardholders in local memory Socketed relays improve serviceability Great solution for enterprise and government installations

Software House RM2L-NH keypad arming station
Software House RM2L-NH keypad arming station

Includes the LCD and keypad, but no read head Ideal for arming/disarming intrusion zones when a reader is not required

Software House IP-ACM2A-EP 2-reader Ethernet door module
Software House IP-ACM2A-EP 2-reader Ethernet door module

In plastic enclosure Cost-effective IP access control module Up to 32 IP-ACMs per iSTAR Ultra and iSTAR Ultra SE, and up to 8 per iSTAR Ultra LT Convenient second port for biometric reader or efficient network diagnostics Wet lock outputs provide up to 0.75A each for ability to power most lock types Highly distributed architecture PoE or PoE Plus 10/100/GigE connectivity AES-256 network encryption Configurable offline mode Easy setup with static IP or DHCP Small, ‘office-ready” enclosure design Full duplex RS-485 on board to leverage future technology Selectable “wet” and dry output relays OSDP support fosters device interoperability Supports TLS 1.2 and 802.1X secure network protocols for protection against the threat of cyber attacks

Software House RM-DCM-2 door control module
Software House RM-DCM-2 door control module

Full-featured local door control module lowers wiring costs Complete set of inputs and outputs to control one door Flexible control options for reader LEDs and beep patterns Easily expandable Status LEDs on inputs and outputs for quick troubleshooting Built-in tamper switch provides secure installation Plug-in screw terminals reduce installation time

Software House C-CURE 9000 Enterprise access control software
Software House C-CURE 9000 Enterprise access control software

C•CURE 9000 Enterprise provides an advanced distributed architecture for enterprise scalability C•CURE 9000 Enterprise gives corporate security personnel and IT managers central control over the entire system, while each local facility maintains independent control of its individual operation Its power gives system administrators at the main facility the ability to configure and monitor all locations from that single site It also allows to simultaneously monitor alarms from multiple facilities from one convenient workstation

Software House C-CURE 9000 v2.90 access control software
Software House C-CURE 9000 v2.90 access control software

OSDP support for reader to panel communications on iSTAR Ultra Series controllers Supports up to 5,000 readers per single server and 40 satellite application server scalability for Enterprise systems Access to C•CURE 9000 from any internet browser with C•CURE Web Administer and monitor C•CURE 9000 from mobile device with C•CURE Go Software House Connected Partner Program for standards-based integrations Part of the Cyber Protection Program to reduce the risk of vulnerabilities Video Smart Search and Analytic Search for fast video investigation Video Clip Management to customise, store and automate video footage Save and quickly recall frequently visited tabs and objects with the new CCURE 9000 dashboard

Software House AS0073-CSI input module
Software House AS0073-CSI input module

Provides cost-effective expansion of input and output capacity Compatible with full range of Software House iSTAR and apC access control panels Locate modules up to 1,220 m (4,000 ft) away from controllers using flexible two-wire RS-485 RM bus Reduces length of sensor and control wiring to save installation costs I8-CSI, configurable supervised input model, allows use of existing input wiring without changing end-of-line (EOL) resistors Three status LEDs per input (red/yellow/green) and one per output enable quick diagnostics and troubleshooting Small, modular size requires minimal panel space Dedicated tamper input included

Software House iSTAR Ultra SE - Ultra mode network-ready door controller
Software House iSTAR Ultra SE - Ultra mode network-ready door controller

Powerful network-ready door controller for up to 32 readers (16 from ACMs) Dedicated DIP switch allows to go from “Pro mode” for use with C•CURE 800/8000 and C•CURE 9000 to “Ultra mode” for use with C•CURE 9000 Dual GigE network ports for redundant network operation Hardened Linux embedded OS for improved security and scalability Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Includes global anti-passback and advanced peer-to-peer clustering Native intrusion zone functionality Manages up to 500,000 cardholders in local memory Socketed relays improve serviceability Dedicated input for fire alarm interlock overrides door locks during fire conditions Onboard 256-bit AES network encryption Great solution for enterprise and government installations

Software House IP-ACM2A-MB 2-reader Ethernet door module
Software House IP-ACM2A-MB 2-reader Ethernet door module

Board only Cost-effective IP access control module Up to 32 IP-ACMs per iSTAR Ultra and iSTAR Ultra SE, and up to 8 per iSTAR Ultra LT Convenient second port for biometric reader or efficient network diagnostics Wet lock outputs provide up to 0.75A each for ability to power most lock types Highly distributed architecture PoE or PoE Plus 10/100/GigE connectivity AES-256 network encryption Configurable offline mode Easy setup with static IP or DHCP Small, ‘office-ready” enclosure design Full duplex RS-485 on board to leverage future technology Selectable “wet” and dry output relays OSDP support fosters device interoperability Supports TLS 1.2 and 802.1X secure network protocols for protection against the threat of cyber attacks

Software House IP-ACM2A-EM 2-reader Ethernet door module
Software House IP-ACM2A-EM 2-reader Ethernet door module

In metal enclosure Cost-effective IP access control module Up to 32 IP-ACMs per iSTAR Ultra and iSTAR Ultra SE, and up to 8 per iSTAR Ultra LT Convenient second port for biometric reader or efficient network diagnostics Wet lock outputs provide up to 0.75A each for ability to power most lock types Highly distributed architecture PoE or PoE Plus 10/100/GigE connectivity AES-256 network encryption Configurable offline mode Easy setup with static IP or DHCP Small, ‘office-ready” enclosure design Full duplex RS-485 on board to leverage future technology Selectable “wet” and dry output relays OSDP support fosters device interoperability Supports TLS 1.2 and 802.1X secure network protocols for protection against the threat of cyber attacks

Related white papers
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
The top 4 reasons to upgrade physical security with the Cloud

The top 4 reasons to upgrade physical security with the Cloud

Download
11 advantages of a combined system for access control and intrusion

11 advantages of a combined system for access control and intrusion

Download
Related articles
Louvre heist exposes security gaps: How smarter security could have prevented a $100 million theft

Louvre heist exposes security gaps: How smarter security could have prevented a $100 million theft

AVS: New standard for alarm monitoring centres

AVS: New standard for alarm monitoring centres

ICT expands in CEE region with new sales director

ICT expands in CEE region with new sales director

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec