Software House CC800-5S-EN Access control software
Technical Specification
- Make: Software House
- Model code: CC800-5S-EN
- Series: C-Cure Series
- Max No. of Doors per System: 64
- No of Cardholders included: 40,000
C•CURE 800 Model 5 System Software Only - ENGLISH includes server software and 3 CCURE Client licenses. C•CURE 800/8000 is a scalable security management solution encompassing complete access control and advanced event monitoring. The system integrates with critical business applications including CCTV and digital video such as the American Dynamics Intellex® digital video management system, visitor management, ERP, HR/time and attendance, and third party devices such as fire alarms, intercoms, burglar and other alarms.
Read moreMake | Software House |
---|---|
Manufacturer | Software House |
Category | Access Control>Access control software |
Model code | CC800-5S-EN |
Max No. of Doors per System | 64 |
No of Cardholders included | 40,000 |
Reader Types | Proximity |
No of concurrent PC Operators | 3 operators |
Communication | TCP/IP |
Visitor Management | Yes |
Time & Attendance | Yes |
Guard Tours | Yes |
Central / Remote Monitoring | Yes |
Multiple Tenants / Partitioning | Yes |
System Requirements | Operating System: Windows® Server 2003, Windows XP Professional |
Additional info |
C•CURE 800 Model 5 System Software Only - ENGLISH includes server software and 3 CCURE Client licenses. C•CURE 800/8000 is a scalable security management solution encompassing complete access control and advanced event monitoring. The system integrates with critical business applications including CCTV and digital video such as the American Dynamics Intellex® digital video management system, visitor management, ERP, HR/time and attendance, and third party devices such as fire alarms, intercoms, burglar and other alarms. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The security challenges of data centers
The critical importance of Trusted Execution Environment in access control
Access and security in the age of hybrid working
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download