SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6

Cyber security

Software House Cyber security

Software House C-CURE ID Badging Software
Software House C-CURE ID Badging Software

Software House C-CURE ID badging software utilizes Microsoft .NET guidelines for the GUI which enables to create professional and sophisticated badges.

Software House USTAR-LT16-EP Network-Ready Door Controller
Software House USTAR-LT16-EP Network-Ready Door Controller

Supports 16 readers in plastic enclosure Powerful IP-ready door controller Hardened Linux embedded OS for improved security and scalability Onboard 256-bit AES network encryption Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Native intrusion zone functionality Includes global anti-passback and advanced peer-to-peer clustering Manages up to 500,000 cardholders in local memory

Software House USTAR-LT16-MB Network-Ready Door Controller
Software House USTAR-LT16-MB Network-Ready Door Controller

Supports 16 readers, board only Powerful IP-ready door controller Hardened Linux embedded OS for improved security and scalability Onboard 256-bit AES network encryption Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Native intrusion zone functionality Includes global anti-passback and advanced peer-to-peer clustering Manages up to 500,000 cardholders in local memory

Software House Business Intelligence Reporting Suite (BIRS) Reporting Software
Software House Business Intelligence Reporting Suite (BIRS) Reporting Software

Intuitive user interface and web-based reporting for C•CURE customers Share and blend data from other sources to yield critical business information Leverages Microsoft® Business Intelligence (BI) tools Utilizes the latest Microsoft SQL databases for the latest features and technology and SQL Reporting Service for report delivery and presentation Time interval synchronized replication of C•CURE 800/8000 database and journals to provide data warehouse shared with other applications Reporting and processing can be performed from the C•CURE host Web access and email delivery options Subscription options for automated delivery of reports Dashboard, graphical, and statistical reports, and reports customized by user Users can subscribe to reports for delivery (requires SQL Reporting Services) Reports generated by any PC with compatible Web browser without C•CURE Client software Data offered and secured via Active Directory and SQL permissions Optional front end or other application integration including SharePoint

Software House GSTAR-ACM-SE-4U Cyber-Hardened Network Door Controller
Software House GSTAR-ACM-SE-4U Cyber-Hardened Network Door Controller

ACM board in 4U rack mount enclosure Supports up to eight Wiegand, RM or OSDP readers, 16 supervised inputs, and 8 outputs dry-configured Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Software House USTAR-LT08-MB Network-Ready Door Controller
Software House USTAR-LT08-MB Network-Ready Door Controller

Supports 8 readers, board only Powerful IP-ready door controller Hardened Linux embedded OS for improved security and scalability Onboard 256-bit AES network encryption Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Native intrusion zone functionality Includes global anti-passback and advanced peer-to-peer clustering Manages up to 500,000 cardholders in local memory

Software House C-CURE 9000 Web-based Client Access Control Software
Software House C-CURE 9000 Web-based Client Access Control Software

Access C•CURE 9000 from any PC with an internet browser Configure, view, and manage personnel records and credentials, and assign clearances quickly and easily with an adaptive interface Customize the appearance of C•CURE 9000 for different operators for a more simplified user interface Operator preview mode to see defined roles and responsibilities View patterns and anomalies with analytical bubble images color-coded by priority for a dynamic visual alarm monitoring experience Smoothly transition from light to dark mode theme to reduce light reflection for optimal viewing in a dark environment Advanced search, toggle, and filtering capabilities for foolproof views Supports User Defined Fields (UDF) to customize personnel information Quickly search personnel records by name to look up card holder information Easily print ID badges for individual employees or select multiple employees for batch printing Streamlined and intuitive icon-driven user interface for an enhanced user experience TLS 1.2 secure communication to server

Software House USTAR-LT16-EM Network-Ready Door Controller
Software House USTAR-LT16-EM Network-Ready Door Controller

Supports 16 readers in metal enclosure Powerful IP-ready door controller Hardened Linux embedded OS for improved security and scalability Onboard 256-bit AES network encryption Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Native intrusion zone functionality Includes global anti-passback and advanced peer-to-peer clustering Manages up to 500,000 cardholders in local memory

Software House USTAR-LT08-EM Network-Ready Door Controller
Software House USTAR-LT08-EM Network-Ready Door Controller

Supports 8 readers in metal enclosure Powerful IP-ready door controller Hardened Linux embedded OS for improved security and scalability Onboard 256-bit AES network encryption Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Native intrusion zone functionality Includes global anti-passback and advanced peer-to-peer clustering Manages up to 500,000 cardholders in local memory

Software House USTAR-LT08-EP Network-Ready Door Controller
Software House USTAR-LT08-EP Network-Ready Door Controller

Supports 8 readers in plastic enclosure Powerful IP-ready door controller Hardened Linux embedded OS for improved security and scalability Onboard 256-bit AES network encryption Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Native intrusion zone functionality Includes global anti-passback and advanced peer-to-peer clustering Manages up to 500,000 cardholders in local memory

Software House ESTAR001-MB One-Reader IP Edge Access Door Controller
Software House ESTAR001-MB One-Reader IP Edge Access Door Controller

Motherboard only Controls and powers all access control devices at the door to minimize installation costs Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localised access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Software House ESTAR004 Four-Reader IP Edge Access Door Controller
Software House ESTAR004 Four-Reader IP Edge Access Door Controller

With enclosure Controls and powers all access control devices at the door to minimize installation costs Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localized access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Software House C-CURE Web v2.80 Access Control Software
Software House C-CURE Web v2.80 Access Control Software

Health diagnostics dashboard provides intuitive snapshot of system performance over the last 7 days Support for User Defined Fields (UDF) to customize Personnel information Swipe and Show allows operator to visually confirm card holder Monitor all activity of Personnel to detect unusual behavior Easily search by name to lookup card holder Provides access to C•CURE 9000 from any computer or mobile device with an Internet browser Manage personnel and their photos, display dynamic views, and monitor system activity Activate/deactivate, acknowledge, and log messages on events Lock/unlock and momentarily unlock doors View journal history and audit trail activity Intuitive icon-driven user interface TSL secure communication to server

Software House C-CURE Go Install Mobile App
Software House C-CURE Go Install Mobile App

Quickly configure network settings and monitor live output of iSTAR Ultra LT door controller Easily view recorded data and boot-up log information for quick audit trail Quickly reboot iSTAR Ultra LT should the unit go offline Supported on both iOS and Android platforms Available for free on the iTunes App Store and Google Play

Software House C-CURE 9000 Go Mobile App
Software House C-CURE 9000 Go Mobile App

Extend security reach from anywhere, at any time Manage personnel records easily while on the go Monitor C•CURE 9000 alarms and events remotely Receive up-to-date information quickly while responding to events Lock and unlock doors with a touch of a button View live and recorded video from cameras connected to a VideoEdge Network Video Recorder (NVR) Easily search camera lists to view live or playback recorded events Take and store photos for personnel records right from mobile device Easily navigate to a specific date and time for forensic investigation

Software House ESTAR001 One-Reader IP Edge Access Door Controller
Software House ESTAR001 One-Reader IP Edge Access Door Controller

With enclosure Controls and powers all access control devices at the door to minimize installation costs Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localized access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Software House GSTAR008-SE Cyber-Hardened Network Door Controller
Software House GSTAR008-SE Cyber-Hardened Network Door Controller

With enclosure, PSU Powerful cyber-hardened network door controller for 8 readers Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Software House ESTAR001-MBP One-Reader IP Edge Access Door Controller
Software House ESTAR001-MBP One-Reader IP Edge Access Door Controller

Motherboard with PoE module Controls and powers all access control devices at the door to minimize installation costs Power over Ethernet (PoE) module features PoE Plus with enough power for two doors and associated devices Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localised access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Software House iSTAR Pro 128 MB Network-Ready Door Controller
Software House iSTAR Pro 128 MB Network-Ready Door Controller

Powerful 8 or 16 reader network-ready controller Expanded memory for up to 500,000 cardholders Global and local anti-passback with occupancy control Embedded intrusion zone functionality Retrofits possible with apC adapter plate Onboard battery backup and storage of configuration data using nonvolatile memory Supports both direct readers and RS-485 readers for greater coverage LCD provides important controller status and diagnostics information Supports multiple cards per cardholder and multiple formats for a highly secure, flexible solution Great solution for Universities, Healthcare, and Transportation applications Compatible with C•CURE 9000 and C•CURE 800/8000 

Software House iSTAR Pro 64 MB Network-Ready Door Controller
Software House iSTAR Pro 64 MB Network-Ready Door Controller

Powerful 8 or 16 reader network-ready controller Expanded memory for up to 500,000 cardholders Global and local anti-passback with occupancy control Embedded intrusion zone functionality Retrofits possible with apC adapter plate Onboard battery backup and storage of configuration data using nonvolatile memory Supports both direct readers and RS-485 readers for greater coverage LCD provides important controller status and diagnostics information Supports multiple cards per cardholder and multiple formats for a highly secure, flexible solution Great solution for Universities, Healthcare, and Transportation applications Compatible with C•CURE 9000 and C•CURE 800/8000 

Software House ESTAR002 Two-Reader IP Edge Access Door Controller
Software House ESTAR002 Two-Reader IP Edge Access Door Controller

With enclosure Controls and powers all access control devices at the door to minimize installation costs Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localized access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Software House GSTAR-ACM-SE Cyber-Hardened Network Door Controller
Software House GSTAR-ACM-SE Cyber-Hardened Network Door Controller

ACM board Supports up to eight Wiegand, RM or OSDP readers, 16 supervised inputs, and 8 outputs dry-configured Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Software House C-CURE 9000 Enterprise Access Control Software
Software House C-CURE 9000 Enterprise Access Control Software

C•CURE 9000 Enterprise provides an advanced distributed architecture for enterprise scalability C•CURE 9000 Enterprise gives corporate security personnel and IT managers central control over the entire system, while each local facility maintains independent control of its individual operation Its power gives system administrators at the main facility the ability to configure and monitor all locations from that single site It also allows to simultaneously monitor alarms from multiple facilities from one convenient workstation

Software House GSTAR-PRO-SE08 Cyber-Hardened Network Door Controller
Software House GSTAR-PRO-SE08 Cyber-Hardened Network Door Controller

Includes General Controller Module, 1 Access Control Module Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Software House ESTAR002-MB Two-Reader IP Edge Access Door Controller
Software House ESTAR002-MB Two-Reader IP Edge Access Door Controller

Motherboard only Controls and powers all access control devices at the door to minimize installation costs Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localized access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Software House CC9-2FA-100 C•CURE 9000 Two Factor Authentication, 100 readers
Software House CC9-2FA-100 C•CURE 9000 Two Factor Authentication, 100 readers

Two Factor Authentication, 100 readers Verify identities with on-demand two-factor authentication Auto-enroll personnel from C•CURE 9000 Self-registration via mobile app download enhances user experience Supported by iSTAR controllers - no hardware replacement or retrofits Easy to deploy and manage Lower cost alternative to biometric readers and smart cards

Software House CC9-2FA-S C•CURE 9000 Two Factor Authentication, SSA per server
Software House CC9-2FA-S C•CURE 9000 Two Factor Authentication, SSA per server

Two Factor Authentication, one reader Verify identities with on-demand two-factor authentication Auto-enroll personnel from C•CURE 9000 Self-registration via mobile app download enhances user experience Supported by iSTAR controllers - no hardware replacement or retrofits Easy to deploy and manage Lower cost alternative to biometric readers and smart cards

Software House CC9-2FA-25 C•CURE 9000 Two Factor Authentication, 25 readers
Software House CC9-2FA-25 C•CURE 9000 Two Factor Authentication, 25 readers

Two Factor Authentication, 25 readers Verify identities with on-demand two-factor authentication Auto-enroll personnel from C•CURE 9000 Self-registration via mobile app download enhances user experience Supported by iSTAR controllers - no hardware replacement or retrofits Easy to deploy and manage Lower cost alternative to biometric readers and smart cards

  • «
  • 1
  • 2
  • »
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec