Esser EnterpriseAccess 2000 Access control software

Technical Specification

Features:
  • Make: Esser
  • Model code: EnterpriseAccess 2000
Additional info:

Enterprise Access 2000 is a windows based software package which is used with ACT control units to provide a networked access control system for up to 8 doors. The user friendly software uses the familiar windows style of data entry for all the access data such as user details and programming of the door control units. When all the information has been entered it is downloaded and stored in non volatile memory at each control unit. Where systems are networked together the download of data can be achieved via the network or by downloading the data into each individual control unit using a laptop computer. The advantage of holding the information at each control unit means that it is possible for the access control system to function offline without the PC connected. When the PC is connected and the system is online it is then possible to retrieve the activity logs from the control units and obtain screen reports and printed reports.

Read more
Make Esser
Manufacturer Esser
Category Access Control>Access control software
Model code EnterpriseAccess 2000
Additional info Enterprise Access 2000 is a windows based software package which is used with ACT control units to provide a networked access control system for up to 8 doors. The user friendly software uses the familiar windows style of data entry for all the access data such as user details and programming of the door control units. When all the information has been entered it is downloaded and stored in non volatile memory at each control unit. Where systems are networked together the download of data can be achieved via the network or by downloading the data into each individual control unit using a laptop computer. The advantage of holding the information at each control unit means that it is possible for the access control system to function offline without the PC connected. When the PC is connected and the system is online it is then possible to retrieve the activity logs from the control units and obtain screen reports and printed reports.
Download PDF version Download PDF version

Related Whitepapers

Access and security in the age of hybrid working

Cybersecurity in keyless access management

The critical role of access control in K-12 school security

Quick poll
What is the most significant challenge facing smart building security today?




Related tags