Casi Rusco Picture Perfect Access control system
Technical Specification
- Make: Casi Rusco
- Model code: Picture Perfect
- Accessories: Access Control and Security Management System
Picture Perfect offers advanced access control and alarm monitoring capabilities for global organisations providing a single point of management for both local and global locations. Picture Perfect is built on either the IBM RS/6000 series running the AIX operating system or Intel Architecture servers running Red Hat Linux. Picture Perfect features a modular architecture enabling unlimited expandability. A standard Web browser can be used to access the system. The Card Access Report Management Application administrative tool is designed to allow department managers to generate their own reports.
Read moreMake | Casi Rusco |
---|---|
Manufacturer | Interlogix |
Category | Access Control>Access control systems & kits |
Model code | Picture Perfect |
Accessories | Access Control and Security Management System |
Additional info | Picture Perfect offers advanced access control and alarm monitoring capabilities for global organisations providing a single point of management for both local and global locations. Picture Perfect is built on either the IBM RS/6000 series running the AIX operating system or Intel Architecture servers running Red Hat Linux. Picture Perfect features a modular architecture enabling unlimited expandability. A standard Web browser can be used to access the system. The Card Access Report Management Application administrative tool is designed to allow department managers to generate their own reports. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
Integrated access control: reap the benefits of connected security
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download