Software House GSTAR-ACM-SE-4U Cyber-Hardened Network Door Controller

Technical Specification

Features:
  • Make: Software House
  • Model code: GSTAR-ACM-SE-4U
  • Series: iSTAR Ultra G2 SE
  • Controller Type: Networkable
  • No of Cardholders: 1,000,000
Read more
Additional info:

ACM board in 4U rack mount enclosure Supports up to eight Wiegand, RM or OSDP readers, 16 supervised inputs, and 8 outputs dry-configured Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Read more
Make Software House
Manufacturer Software House
Category Access Control>Access control controllers
Model code GSTAR-ACM-SE-4U
Series iSTAR Ultra G2 SE
Controller Type Networkable
No of Cardholders 1,000,000
Offline Capabilities Yes
Networkable Yes
Communication Type Eight RS-485 ports, four full duplex and four half duplex
Universal / Wiegand Reader Interface Yes
Electrical Specifications Voltage: 12 V DC / 24 V DC
Physical Specifications Dimensions mm: 175 x 444 x 123
Weight g: 4,100
Environmental Specifications Operating Temp oC: 0 ~ 50 C (32 ~ 122 F)
Operating Humidity %: 5 ~ 95
Additional info
  • ACM board in 4U rack mount enclosure
  • Supports up to eight Wiegand, RM or OSDP readers, 16 supervised inputs, and 8 outputs dry-configured
  • Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection
  • Hardened Linux embedded OS for improved security and scalability
  • Up to 1M cardholders in local memory
  • Dual GigE network ports with IPv6, DHCP and 802.1X support
  • Onboard 256-bit AES network encryption
  • Supports OSDP Secure Channel for encrypted reader communications
  • Supports Embedded High Assurance FICAM operation without third-party hardware
Download PDF version Download PDF version

Related Whitepapers

The Security Challenges Of Data Centers

The Critical Importance of Trusted Execution Environment in Access Control

Four Areas to Consider in Frictionless Access Control

Quick poll
What's the primary benefit of integrating access control with video surveillance?