Software House C-CURE Web v2.80 access control software

Technical Specification

Features:
  • Make: Software House
  • Model code: C-CURE Web v2.80
  • Reader Types: Card
  • Central / Remote Monitoring: Yes
  • Web-enabled software: Yes
Additional info:

Health diagnostics dashboard provides intuitive snapshot of system performance over the last 7 days Support for User Defined Fields (UDF) to customise Personnel information Swipe and Show allows operator to visually confirm card holder Monitor all activity of Personnel to detect unusual behaviour Easily search by name to lookup card holder Provides access to C•CURE 9000 from any computer or mobile device with an Internet browser Manage personnel and their photos, display dynamic views, and monitor system activity Activate/deactivate, acknowledge, and log messages on events Lock/unlock and momentarily unlock doors View journal history and audit trail activity Intuitive icon-driven user interface TSL secure communication to server

Read more
Make Software House
Manufacturer Software House
Category Access Control>Access control software
Model code C-CURE Web v2.80
Reader Types Card
Central / Remote Monitoring Yes
Web-enabled software Yes
System Requirements Web Browser: Microsoft Internet Explorer v10 and above; Microsoft Edge v40 and above; Mozilla Firefox v30 and above, and Google Chrome v35 and above
Additional info
  • Health diagnostics dashboard provides intuitive snapshot of system performance over the last 7 days
  • Support for User Defined Fields (UDF) to customise Personnel information
  • Swipe and Show allows operator to visually confirm card holder
  • Monitor all activity of Personnel to detect unusual behaviour
  • Easily search by name to lookup card holder
  • Provides access to C•CURE 9000 from any computer or mobile device with an Internet browser
  • Manage personnel and their photos, display dynamic views, and monitor system activity
  • Activate/deactivate, acknowledge, and log messages on events
  • Lock/unlock and momentarily unlock doors
  • View journal history and audit trail activity
  • Intuitive icon-driven user interface
  • TSL secure communication to server
Download PDF version Download PDF version

Related Whitepapers

The critical importance of Trusted Execution Environment in access control

Access and security in the age of hybrid working

Cybersecurity in keyless access management

Quick poll
Which feature is most important in a video surveillance system?





$common_vars['trending_topic_article_popup'][0]->title

Vismo uses Dragonfly intelligence for better travel security