Esser EnterpriseAccess 2000 Access control software
Technical Specification
- Make: Esser
- Model code: EnterpriseAccess 2000
Enterprise Access 2000 is a windows based software package which is used with ACT control units to provide a networked access control system for up to 8 doors. The user friendly software uses the familiar windows style of data entry for all the access data such as user details and programming of the door control units. When all the information has been entered it is downloaded and stored in non volatile memory at each control unit. Where systems are networked together the download of data can be achieved via the network or by downloading the data into each individual control unit using a laptop computer. The advantage of holding the information at each control unit means that it is possible for the access control system to function offline without the PC connected. When the PC is connected and the system is online it is then possible to retrieve the activity logs from the control units and obtain screen reports and printed reports.
Read moreMake | Esser |
---|---|
Manufacturer | Esser |
Category | Access Control>Access control software |
Model code | EnterpriseAccess 2000 |
Additional info | Enterprise Access 2000 is a windows based software package which is used with ACT control units to provide a networked access control system for up to 8 doors. The user friendly software uses the familiar windows style of data entry for all the access data such as user details and programming of the door control units. When all the information has been entered it is downloaded and stored in non volatile memory at each control unit. Where systems are networked together the download of data can be achieved via the network or by downloading the data into each individual control unit using a laptop computer. The advantage of holding the information at each control unit means that it is possible for the access control system to function offline without the PC connected. When the PC is connected and the system is online it is then possible to retrieve the activity logs from the control units and obtain screen reports and printed reports. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download