SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6

Electronic access control

Electronic access control

Software House Electronic access control

Software House CC9-AWF10KPK Access Management Workflow
Software House CC9-AWF10KPK Access Management Workflow

Additional 10,000 Approvers/Requesters Sends access requests to the owner of a specified clearance directly thereby streamlining the process Configure multiple levels of approvers and minimum number of approvers per level Define approval hierarchy Specify recurring clearance review activity Escalate missed clearance reviews Reduce workload on security personnel Empower cardholders to make access requests Entrust clearance owners with the control to approve, deny and revoke clearances Maintain security by turning company policies into automated workflows Comprehensive log for review and audit purposes Optionally configure doors to automatically initiate requests upon “access denied” events

Software House CC9-AWF-SM-UP Access Management Workflow Upgrade
Software House CC9-AWF-SM-UP Access Management Workflow Upgrade

Small to medium upgrade Sends access requests to the owner of a specified clearance directly thereby streamlining the process Configure multiple levels of approvers and minimum number of approvers per level Define approval hierarchy Specify recurring clearance review activity Escalate missed clearance reviews Reduce workload on security personnel Empower cardholders to make access requests Entrust clearance owners with the control to approve, deny and revoke clearances Maintain security by turning company policies into automated workflows Comprehensive log for review and audit purposes Optionally configure doors to automatically initiate requests upon “access denied” events

Software House CC9-AWF-MD-UP Access Management Workflow Upgrade
Software House CC9-AWF-MD-UP Access Management Workflow Upgrade

Medium to large upgrade Sends access requests to the owner of a specified clearance directly thereby streamlining the process Configure multiple levels of approvers and minimum number of approvers per level Define approval hierarchy Specify recurring clearance review activity Escalate missed clearance reviews Reduce workload on security personnel Empower cardholders to make access requests Entrust clearance owners with the control to approve, deny and revoke clearances Maintain security by turning company policies into automated workflows Comprehensive log for review and audit purposes Optionally configure doors to automatically initiate requests upon “access denied” events

Software House RM1-PI26 Proximity Reader
Software House RM1-PI26 Proximity Reader

Combines HID Indala ASP® proximity technology with the advanced electronics Provides two supervised inputs and two control point outputs Three high-intensity LEDs (red, amber, and green) indicate system conditions Operates in star or multi-drop configuration to support diverse security needs Built-in tamper switch and security screws protect reader electronics Rugged design suitable for interior or exterior environment

Software House STAR008-4URM Rack Mount Door Controller
Software House STAR008-4URM Rack Mount Door Controller

Leverages 4-post IT racks or standard 2-post Telco racks Includes all the necessary components required to control up to 16 doors, in one enclosure Supports 8 RM readers with integral lock power Front panel LCD and LEDs enable quick diagnostics and troubleshooting Hinged cover provides easy access to diagnostic port Dual network LAN ports offer redundant network connection Fully compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats including PIV II extended formats

Software House CC9-AWF-LG Access Management Workflow Web-Based Portal
Software House CC9-AWF-LG Access Management Workflow Web-Based Portal

Includes a total of 1,000 unique Approvers/Requesters Sends access requests to the owner of a specified clearance directly thereby streamlining the process Configure multiple levels of approvers and minimum number of approvers per level Define approval hierarchy Specify recurring clearance review activity Escalate missed clearance reviews Reduce workload on security personnel Empower cardholders to make access requests Entrust clearance owners with the control to approve, deny and revoke clearances Maintain security by turning company policies into automated workflows Comprehensive log for review and audit purposes Optionally configure doors to automatically initiate requests upon “access denied” events

Software House PSX-WISU16-E8SN Pre-Wired System
Software House PSX-WISU16-E8SN Pre-Wired System

Wired for 16 reader iStar Ultra, Tie Wrap, Network Connected, 16 Aux Outputs Provides uniform installations across an enterprise One enclosure, one AC drop, network-ready Capable of integrating with C-CURE 9000 Enables operational efficiencies and global standards UL & CE certified Customized design and high reliability operation

Software House STAR016-4URM Rack Mount Door Controller
Software House STAR016-4URM Rack Mount Door Controller

Leverages 4-post IT racks or standard 2-post Telco racks Includes all the necessary components required to control up to 16 doors, in one enclosure Supports 16 RM readers with integral lock power Front panel LCD and LEDs enable quick diagnostics and troubleshooting Hinged cover provides easy access to diagnostic port Dual network LAN ports offer redundant network connection Fully compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats including PIV II extended formats

Software House STAR008-2URM Rack Mount Door Controller
Software House STAR008-2URM Rack Mount Door Controller

Saves wall space and lowers installation costs Leverages standard IT server racks Controls 8 RM readers using space-saving 2U enclosure, 16 inputs and 8 outputs included Patented design allows fast field wiring using quick connects Front panel LCD and LEDs enable quick diagnostics and troubleshooting Industrial handles and slide rails ensure easy installation Hinged cover provides easy access to diagnostic port Dual network LAN ports for redundant network connection Compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats, including FIPS 201 extended formats, for a highly secure, flexible solution

Software House SWH-TST-100 Touchscreen Terminal
Software House SWH-TST-100 Touchscreen Terminal

4.3” capacitive touchscreen provides ideal user experience Intuitive icon-driven user interface for both access control and intrusion Encrypted RS-485 communications Easily arm and disarm intrusion zones using card, PIN, or combination Built-in motion sensor saves screen life Menu-driven keypad commands for custom operations Compatible with all iSTAR door controllers Supports Software House RM and smart reader protocols Supports MIFARE, DESFire, EV1 and EV2, HID iCLASS, iCLASS SE, iCLASS Seos, and HID Proximity card technologies Prioritize and enable/disable card technologies to read Future-proof design allows users to add features as they become available Firmware download includes read head firmware updates

Software House CC9-AWF-MD Access Management Workflow Web-Based Portal
Software House CC9-AWF-MD Access Management Workflow Web-Based Portal

Includes a total of 1,000 unique Approvers/Requesters Sends access requests to the owner of a specified clearance directly thereby streamlining the process Configure multiple levels of approvers and minimum number of approvers per level Define approval hierarchy Specify recurring clearance review activity Escalate missed clearance reviews Reduce workload on security personnel Empower cardholders to make access requests Entrust clearance owners with the control to approve, deny and revoke clearances Maintain security by turning company policies into automated workflows Comprehensive log for review and audit purposes Optionally configure doors to automatically initiate requests upon “access denied” events

Software House STAR016-2URM Rack Mount Door Controller
Software House STAR016-2URM Rack Mount Door Controller

Saves wall space and lowers installation costs Leverages standard IT server racks Controls 16 RM readers using space-saving 2U enclosure, 32 inputs and 16 outputs included Patented design allows fast field wiring using quick connects Front panel LCD and LEDs enable quick diagnostics and troubleshooting Industrial handles and slide rails ensure easy installation Hinged cover provides easy access to diagnostic port Dual network LAN ports for redundant network connection Compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats, including FIPS 201 extended formats, for a highly secure, flexible solution

Software House USTAR-LT16-EP Network-Ready Door Controller
Software House USTAR-LT16-EP Network-Ready Door Controller

Supports 16 readers in plastic enclosure Powerful IP-ready door controller Hardened Linux embedded OS for improved security and scalability Onboard 256-bit AES network encryption Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Native intrusion zone functionality Includes global anti-passback and advanced peer-to-peer clustering Manages up to 500,000 cardholders in local memory

Software House SWH-4130-G Multi-Technology Reader
Software House SWH-4130-G Multi-Technology Reader

ACC 37-bit format Triple-receiver design allows simultaneous reading of HID® proximity cards, Indala® proximity cards, and contactless smart cards Reads more than 10 different types and formats of proximity cards and contactless smart cards, including most common Indala formats Download new functionality or enhancements for a future-proof solution Encryption and custom keys for secure transmission of data Indoor/outdoor use Built-in tamper switch provides secure installation

Software House SWH-4130-G-37B Multi-Technology Reader
Software House SWH-4130-G-37B Multi-Technology Reader

SWH 37-bit format Triple-receiver design allows simultaneous reading of HID® proximity cards, Indala® proximity cards, and contactless smart cards Reads more than 10 different types and formats of proximity cards and contactless smart cards, including most common Indala formats Download new functionality or enhancements for a future-proof solution Encryption and custom keys for secure transmission of data Indoor/outdoor use Built-in tamper switch provides secure installation

Software House STAR016-2UW Rack Mount Door Controller
Software House STAR016-2UW Rack Mount Door Controller

Saves wall space and lowers installation costs Leverages standard IT server racks Controls 16 Wiegand readers using space-saving 2U enclosure, 32 inputs and 16 outputs included Patented design allows fast field wiring using quick connects Front panel LCD and LEDs enable quick diagnostics and troubleshooting Industrial handles and slide rails ensure easy installation Hinged cover provides easy access to diagnostic port Dual network LAN ports for redundant network connection Compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats, including FIPS 201 extended formats, for a highly secure, flexible solution

Software House SWH-TST-100-OUTK Touchscreen Terminal
Software House SWH-TST-100-OUTK Touchscreen Terminal

4.3” capacitive touchscreen provides ideal user experience Outdoor kit with gaskets Intuitive icon-driven user interface for both access control and intrusion Encrypted RS-485 communications Easily arm and disarm intrusion zones using card, PIN, or combination Built-in motion sensor saves screen life Menu-driven keypad commands for custom operations Compatible with all iSTAR door controllers Supports Software House RM and smart reader protocols Supports MIFARE, DESFire, EV1 and EV2, HID iCLASS, iCLASS SE, iCLASS Seos, and HID Proximity card technologies Prioritize and enable/disable card technologies to read Future-proof design allows users to add features as they become available Firmware download includes read head firmware updates

Software House STAR008-4UW Rack Mount Door Controller
Software House STAR008-4UW Rack Mount Door Controller

Leverages 4-post IT racks or standard 2-post Telco racks Includes all the necessary components required to control up to 16 doors, in one enclosure Supports 8 Wiegand readers with integral lock power Front panel LCD and LEDs enable quick diagnostics and troubleshooting Hinged cover provides easy access to diagnostic port Dual network LAN ports offer redundant network connection Fully compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats including PIV II extended formats

Software House SWH-4130-37B Black Multi-Technology Reader
Software House SWH-4130-37B Black Multi-Technology Reader

SWH 37-bit format Triple-receiver design allows simultaneous reading of HID® proximity cards, Indala® proximity cards, and contactless smart cards Reads more than 10 different types and formats of proximity cards and contactless smart cards, including most common Indala formats Download new functionality or enhancements for a future-proof solution Encryption and custom keys for secure transmission of data Indoor/outdoor use Built-in tamper switch provides secure installation

Software House RM1-4000 Multi-Technology Reader
Software House RM1-4000 Multi-Technology Reader

Reads both proximity and smart cards, providing an ideal solution for customers looking to transition from proximity to a more secure smart card solution Offers enhanced security through MIFARE® and DESFire®, EV1/EV2 encryption, and is compatible with nearly all major card formats in the industry, including ISO 14443 A/B, ISO 15693, MIFARE, DESFire, FIPS 201 PIV FASC-N read, and most 125 KHz formats (HID and CASI® ProxLite) Provides two supervised inputs and two control point outputs Three high-intensity LEDs (red, amber, and green) indicate system conditions Operates in star or multi-drop configuration to support diverse security needs Built-in tamper switch and security screws protect reader electronics Rugged design suitable for interior or exterior environment

Software House USTAR-LT16-MB Network-Ready Door Controller
Software House USTAR-LT16-MB Network-Ready Door Controller

Supports 16 readers, board only Powerful IP-ready door controller Hardened Linux embedded OS for improved security and scalability Onboard 256-bit AES network encryption Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Native intrusion zone functionality Includes global anti-passback and advanced peer-to-peer clustering Manages up to 500,000 cardholders in local memory

Software House SWH-4130-26B Black Multi-Technology Reader
Software House SWH-4130-26B Black Multi-Technology Reader

26-bit format Triple-receiver design allows simultaneous reading of HID® proximity cards, Indala® proximity cards, and contactless smart cards Reads more than 10 different types and formats of proximity cards and contactless smart cards, including most common Indala formats Download new functionality or enhancements for a future-proof solution Encryption and custom keys for secure transmission of data Indoor/outdoor use Built-in tamper switch provides secure installation

Software House RM1-SE multiCLASS Reader
Software House RM1-SE multiCLASS Reader

Reads latest HID iCLASS SE and Seos cards Provides two supervised inputs and two control point outputs Three high-intensity LEDs (red, amber, and green) indicate system conditions Operates in star or multi-drop configuration to support diverse security needs Built-in tamper switch and security screws protect reader electronics Rugged design suitable for interior or exterior environment

Software House GSTAR-ACM-SE-4U Cyber-Hardened Network Door Controller
Software House GSTAR-ACM-SE-4U Cyber-Hardened Network Door Controller

ACM board in 4U rack mount enclosure Supports up to eight Wiegand, RM or OSDP readers, 16 supervised inputs, and 8 outputs dry-configured Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Software House USTAR-LT08-MB Network-Ready Door Controller
Software House USTAR-LT08-MB Network-Ready Door Controller

Supports 8 readers, board only Powerful IP-ready door controller Hardened Linux embedded OS for improved security and scalability Onboard 256-bit AES network encryption Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Native intrusion zone functionality Includes global anti-passback and advanced peer-to-peer clustering Manages up to 500,000 cardholders in local memory

Software House SWH-4130-G-26B Multi-Technology Reader
Software House SWH-4130-G-26B Multi-Technology Reader

26-bit format Triple-receiver design allows simultaneous reading of HID® proximity cards, Indala® proximity cards, and contactless smart cards Reads more than 10 different types and formats of proximity cards and contactless smart cards, including most common Indala formats Download new functionality or enhancements for a future-proof solution Encryption and custom keys for secure transmission of data Indoor/outdoor use Built-in tamper switch provides secure installation

Software House RM2-P126 Proximity Reader
Software House RM2-P126 Proximity Reader

Combines HID Indala ASP® proximity technology with the advanced electronics Provides two supervised inputs and two control point outputs Three high-intensity LEDs (red, amber, and green) and keypad audio feature indicate system conditions Operates in star or multi-drop configuration to support diverse security needs Built-in tamper switch and security screws protect reader electronics Rugged design suitable for interior or exterior environment

Software House RM2L-PI26 Proximity Reader
Software House RM2L-PI26 Proximity Reader

Combines HID Indala ASP® proximity technology with the advanced electronics Keypad and backlit LCD can be utilized to provide system status and duress capabilities Provides two supervised inputs and two control point outputs Three high-intensity LEDs (red, amber, and green) indicate system conditions Operates in star or multi-drop configuration to support diverse security needs Built-in tamper switch and security screws protect reader electronics Rugged design suitable for interior or exterior environment

  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
Related white papers
One System, One Card

One System, One Card

Download
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Modernizing Access Control

Modernizing Access Control

Download
Related articles
TDSi Becomes TDSi By Hirsch In 2026

TDSi Becomes TDSi By Hirsch In 2026

AI-Driven Security: HiveWatch's New Leadership

AI-Driven Security: HiveWatch's New Leadership

Securitas Acquires Sonitrol Ft. Lauderdale & Level 5

Securitas Acquires Sonitrol Ft. Lauderdale & Level 5

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec