Software House, From Tyco Security Products

iSTAR Ultra

iSTAR Ultra

Up to 32 readers are supported by iSTAR Ultra, of which 16 may come from the Access Control Module’s (ACM) I/O units; the rest can be made up of ASSA ABLOY Aperio wireless lock sets and devices. iSTAR Ultra communicates with the latest version of C-CURE 9000 security and event management system for a complete access control solution.

http://www.swhouse.com/products/iSTAR-Ultra.aspx


    Featured

    New Products

    • Automatic Systems V07

      Automatic Systems V07

      Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

    • A8V MIND

      A8V MIND

      Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

    • Unified VMS

      AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities