CEM Systems AC2000 SE version 5.5 security management system released
Product Profile
CEM Systems has released version 5.5 of its core AC2000 SE (Standard Edition) security management system. Ideal for large to medium sized facilities, AC2000 SE has proven itself as one of the industry's most comprehensive security systems available.
The system offers advanced access control, alarm processing, photo badging and external systems integration. AC2000 SE also incorporates industry leading CEM hardware and offers clients a comprehensive software suite for administration and advanced reporting.
Significant changes include a new graphical user interface for the software splash screens, improved security log-on, enhanced reporting tools and a central overview screen that now allows clients to view alarms across multiple sites.
Benefits at a glance
- Improved reporting
-Statistics report - report on total number of swipes per device per minutes
-Global transactions & alarms report
-Automatic report scheduler - Improved system security logon
-New selectable security policy logon screen with the ability to automatically disable an operator account - Single view of alarms from multiple CDC servers
-New "global" Alarm Event Display (AED) overview screen to view alarms across all linked CDC servers - Increased system expansion
-A single central database server can support up to 176 workstation clients
To arrange a demo email cem.sales@tycoint.com
Technical Specification
Make | CEM |
---|---|
Manufacturer | CEM Systems Ltd |
Category | Access Control>Access control software |
Model code | AC2000 SE System |
Photo ID | Yes |
No of concurrent PC Operators | Unlimited operators |
Visitor Management | Yes |
Import/Export of Information | Yes |
Web-enabled software | Yes |
Additional info | AC2000 standard edition. Powerful integrated IP-based access control system with alarm processing and photo-badging system. Uses CEM InfoProx, Series 600 etc card readers, S8000 controllers and EtherProx readers. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download