SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6

Electronic access control

Electronic access control

Software House Electronic access control

Software House RM2L-SE multiCLASS Reader
Software House RM2L-SE multiCLASS Reader

Reads latest HID iCLASS SE and Seos cards Features the HID SE3200 multi-technology read head, allowing card reads from HID Proximity, iCLASS, iCLASS SE and Seos cards  simultaneously Provides LCD and keypad support for arm/disarm functionality in proprietary burglar alarm installations, per UL 1076 Provides two supervised inputs and two control point outputs Three high-intensity LEDs (red, amber, and green) indicate system conditions Operates in star or multi-drop configuration to support diverse security needs Built-in tamper switch and security screws protect reader electronics Rugged design suitable for interior or exterior environment

Software House SSVR3-16 Access Control Appliance
Software House SSVR3-16 Access Control Appliance

Supports 16 readers Ready to go with pre-installed C•CURE 9000 software and intuitive wizard for easy configuration Includes pre-configured database of readers, doors, controllers, and other standard objects to reduce setup time Can operate as a satellite application server (SAS) in an enterprise environment 256GB solid state drive (SSD) provides enhanced system reliability Intuitive C•CURE 9000 Web Client simplifies operator training Health dashboard to monitor network bandwidth, memory, and other important system functionality

Software House PSX-ISU-E2 Wall Mount Dual Voltage Power System
Software House PSX-ISU-E2 Wall Mount Dual Voltage Power System

A high efficiency, offline switch mode, dual voltage power supply battery charger designed to provide both iSTAR Ultra system power, and lock power for a complete 16-door setup Capable of providing multiple power outputs and featuring user selectability for 12 or 24V DC on the lock supply, the wall mount unit is configured in a painted steel, locking enclosure with tamper switch and integral battery space

Software House RM-CAN Small Metal Enclosure
Software House RM-CAN Small Metal Enclosure

A small metal enclosure with tamper switch Up to one input or output module

Software House IP-ACM2A-EM 2-Reader Ethernet Door Module
Software House IP-ACM2A-EM 2-Reader Ethernet Door Module

In metal enclosure Cost-effective IP access control module Up to 32 IP-ACMs per iSTAR Ultra and iSTAR Ultra SE, and up to 8 per iSTAR Ultra LT Convenient second port for biometric reader or efficient network diagnostics Wet lock outputs provide up to 0.75A each for ability to power most lock types Highly distributed architecture PoE or PoE Plus 10/100/GigE connectivity AES-256 network encryption Configurable offline mode Easy setup with static IP or DHCP Small, ‘office-ready” enclosure design Full duplex RS-485 on board to leverage future technology Selectable “wet” and dry output relays OSDP support fosters device interoperability Supports TLS 1.2 and 802.1X secure network protocols for protection against the threat of cyber attacks

Software House PSX-150-E1 Single Voltage Power System
Software House PSX-150-E1 Single Voltage Power System

With dual outputs Provides uninterrupted back-up power for iSTAR and apC/8X door controllers Supervision of AC fault, system fault, ground fault, reverse battery, fire alarm activation Switched and resettable outputs Network communication interface option Intelligent battery charging and battery state monitoring Dual rate charging restores battery sets from 4Ah to 80Ah Reverse polarity, overcurrent, and thermal overload protection 4.5” enclosure depth accommodates large battery sets RoHS compliant, lead free, high efficiency design

Software House RM-DCM-CAN Large Metal Enclosure
Software House RM-DCM-CAN Large Metal Enclosure

A large metal enclosure with tamper switch Up to four input or output modules

Software House GSTAR004-POE IP Edge Access Door Controller
Software House GSTAR004-POE IP Edge Access Door Controller

iSTAR Edge G2 door controller with metal enclosure, supports four readers Stand-alone IP edge access controller with local database of up to 1,000,000 cardholders Controls and powers all access control devices at the door to minimize installation costs Power over Ethernet (PoE) module features PoE+, with enough power for two doors and associated devices Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Advanced access control feature set including anti-passback, peer-to-peer clustering and local event logic Dual GigE Network ports with IPv6, DHCP and 802.1X support Supports OSDP Secure Channel for encrypted, two-way reader communications Supports embedded High Assurance FICAM operation without additional third-party hardware

Software House SSVR3-08 Access Control Appliance
Software House SSVR3-08 Access Control Appliance

Supports 8 readers Ready to go with pre-installed C•CURE 9000 software and intuitive wizard for easy configuration Includes pre-configured database of readers, doors, controllers, and other standard objects to reduce setup time Can operate as a satellite application server (SAS) in an enterprise environment 256GB solid state drive (SSD) provides enhanced system reliability Intuitive C•CURE 9000 Web Client simplifies operator training Health dashboard to monitor network bandwidth, memory, and other important system functionality

Software House PSX-Z-BKT-HD Z Bracket
Software House PSX-Z-BKT-HD Z Bracket

Software House PSX-Z-BKT-HD is a Z-Bracket for RGS 2U enclosure.

Software House ESTAR002-POE1 Two-Reader IP Edge Access Door Controller
Software House ESTAR002-POE1 Two-Reader IP Edge Access Door Controller

With enclosure Controls and powers all access control devices at the door to minimize installation costs Power over Ethernet (PoE) module features PoE Plus with enough power for two doors and associated devices Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localised access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Software House GSTAR-GCM-2U Cyber-Hardened Network Door Controller
Software House GSTAR-GCM-2U Cyber-Hardened Network Door Controller

GCM board in 2U rack mount enclosure Controls up to four ACMs (Access Control Modules) Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Embedded lock power management lowers installation costs Advanced controller-to-controller communications for cluster-based antipassback and I/O logic Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Software House SSVR3-BR 19-Inch Rack Mount Bracket
Software House SSVR3-BR 19-Inch Rack Mount Bracket

C-CURE 9000 SiteServer mounting bracket 19-inch rack mount

Software House PSX-RGS-X1 2U Multi-Purpose Rack Enclosure
Software House PSX-RGS-X1 2U Multi-Purpose Rack Enclosure

Software House PSX-RGS-X1 is a 2U multi-purpose rack enclosure with slide assembly.

Software House USTAR-GCM-2U Network-Ready Door Controller
Software House USTAR-GCM-2U Network-Ready Door Controller

GCM board with rack enclosure Controls up to four ACMs (Access Control Modules) Embedded lock power management lowers installation costs Hardened Linux embedded OS for improved security and scalability Includes global anti-passback and advanced peer-to-peer clustering Native intrusion zone functionality LCD provides important controller status and diagnostics information Manages up to 500,000 cardholders in local memory Dedicated input for fire alarm interlock overrides door locks during fire conditions Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications

Software House ESTAR004-RM Four-Reader IP Edge Access Door Controller
Software House ESTAR004-RM Four-Reader IP Edge Access Door Controller

With enclosure and two RM-4 modules pre-mounted Controls and powers all access control devices at the door to minimize installation costs Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localized access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Software House GSTAR004-MBP IP Edge Access Door Controller
Software House GSTAR004-MBP IP Edge Access Door Controller

iSTAR Edge G2 board only, supports four readers Stand-alone IP edge access controller with local database of up to 1,000,000 cardholders Controls and powers all access control devices at the door to minimize installation costs Power over Ethernet (PoE) module features PoE+, with enough power for two doors and associated devices Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Advanced access control feature set including anti-passback, peer-to-peer clustering and local event logic Dual GigE Network ports with IPv6, DHCP and 802.1X support Supports OSDP Secure Channel for encrypted, two-way reader communications Supports embedded High Assurance FICAM operation without additional third-party hardware

Software House USTAR008 Network-Ready Door Controller
Software House USTAR008 Network-Ready Door Controller

With enclosure, no PSU Powerful network-ready door controller for 8 readers Embedded lock power management lowers installation costs Hardened Linux embedded OS for improved security and scalability Includes global anti-passback and advanced peer-to-peer clustering Native intrusion zone functionality LCD provides important controller status and diagnostics information Manages up to 500,000 cardholders in local memory Dedicated input for fire alarm interlock overrides door locks during fire conditions Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications

Software House GSTAR004-MB IP Edge Access Door Controller
Software House GSTAR004-MB IP Edge Access Door Controller

iSTAR Edge G2 board only, supports four readers Stand-alone IP edge access controller with local database of up to 1,000,000 cardholders Controls and powers all access control devices at the door to minimize installation costs Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Advanced access control feature set including anti-passback, peer-to-peer clustering and local event logic Dual GigE Network ports with IPv6, DHCP and 802.1X support Supports OSDP Secure Channel for encrypted, two-way reader communications Supports embedded High Assurance FICAM operation without additional third-party hardware

Software House USTAR016 Network-Ready Door Controller
Software House USTAR016 Network-Ready Door Controller

With enclosure, no PSU Powerful network-ready door controller for 16 readers Embedded lock power management lowers installation costs Hardened Linux embedded OS for improved security and scalability Includes global anti-passback and advanced peer-to-peer clustering Native intrusion zone functionality LCD provides important controller status and diagnostics information Manages up to 500,000 cardholders in local memory Dedicated input for fire alarm interlock overrides door locks during fire conditions Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications

Software House USTAR-ACM Network-Ready Door Controller
Software House USTAR-ACM Network-Ready Door Controller

ACM board Supports eight Wiegand, RM or OSDP readers, along with 24 supervised inputs and 16 outputs which can be individually wet- or  dry-configured Embedded lock power management lowers installation costs Hardened Linux embedded OS for improved security and scalability Includes global anti-passback and advanced peer-to-peer clustering Native intrusion zone functionality LCD provides important controller status and diagnostics information Manages up to 500,000 cardholders in local memory Dedicated input for fire alarm interlock overrides door locks during fire conditions Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications

Software House USTAR-CAN Enclosure
Software House USTAR-CAN Enclosure

iSTAR Ultra enclosure 16 gauge carbon steel, with tamper switch

Software House USTAR-GCM Network-Ready Door Controller
Software House USTAR-GCM Network-Ready Door Controller

GCM board Controls up to four ACMs (Access Control Modules) Embedded lock power management lowers installation costs Hardened Linux embedded OS for improved security and scalability Includes global anti-passback and advanced peer-to-peer clustering Native intrusion zone functionality LCD provides important controller status and diagnostics information Manages up to 500,000 cardholders in local memory Dedicated input for fire alarm interlock overrides door locks during fire conditions Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications

Software House GSTAR004-RM IP Edge Access Door Controller
Software House GSTAR004-RM IP Edge Access Door Controller

iSTAR Edge G2 door controller with metal enclosure and two RM-4 modules, supports four readers Stand-alone IP edge access controller with local database of up to 1,000,000 cardholders Controls and powers all access control devices at the door to minimize installation costs Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Advanced access control feature set including anti-passback, peer-to-peer clustering and local event logic Dual GigE Network ports with IPv6, DHCP and 802.1X support Supports OSDP Secure Channel for encrypted, two-way reader communications Supports embedded High Assurance FICAM operation without additional third-party hardware

Software House GSTAR-GCM Cyber-Hardened Network Door Controller
Software House GSTAR-GCM Cyber-Hardened Network Door Controller

GCM board Controls up to four ACMs (Access Control Modules) Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Embedded lock power management lowers installation costs Advanced controller-to-controller communications for cluster-based antipassback and I/O logic Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Software House GSTAR-ACM Cyber-Hardened Network Door Controller
Software House GSTAR-ACM Cyber-Hardened Network Door Controller

ACM board Supports up to eight Wiegand, RM or OSDP readers, 24 supervised inputs, and 16 outputs which can be individually wet- or dry-configured Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Embedded lock power management lowers installation costs Advanced controller-to-controller communications for cluster-based antipassback and I/O logic Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Software House GSTAR016 Cyber-Hardened Network Door Controller
Software House GSTAR016 Cyber-Hardened Network Door Controller

With enclosure, no PSU Powerful cyber-hardened network door controller for 16 readers Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Embedded lock power management lowers installation costs Advanced controller-to-controller communications for cluster-based antipassback and I/O logic Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Related white papers
One System, One Card

One System, One Card

Download
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Modernizing Access Control

Modernizing Access Control

Download
Related articles
TDSi Becomes TDSi By Hirsch In 2026

TDSi Becomes TDSi By Hirsch In 2026

AI-Driven Security: HiveWatch's New Leadership

AI-Driven Security: HiveWatch's New Leadership

Securitas Acquires Sonitrol Ft. Lauderdale & Level 5

Securitas Acquires Sonitrol Ft. Lauderdale & Level 5

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec