Tecom TITAN Access control software
Technical Specification
- Make: Tecom
- Model code: TITAN
TITAN is a true 32-bit access control application that provides Windows interface for management, control and monitoring of the entire Challenger range of products. These include access control, alarm monitoring, HVAC, lighting control as well as video imaging system. Some of the other features of the system are: full upload and download capabilities; alarm handling, monitoring and control via graphics maps; Smart Card programmer facilities for the creation, programming and loading of Tecom Smart Cards and Readers; Alarm handling through a 2 tier response process with individual programmable instructions; flexible database and history reporting schedule and support of multiple card reader technologies.
Read moreMake | Tecom |
---|---|
Manufacturer | Interlogix |
Category | Access Control>Access control software |
Model code | TITAN |
Additional info | TITAN is a true 32-bit access control application that provides Windows interface for management, control and monitoring of the entire Challenger range of products. These include access control, alarm monitoring, HVAC, lighting control as well as video imaging system. Some of the other features of the system are: full upload and download capabilities; alarm handling, monitoring and control via graphics maps; Smart Card programmer facilities for the creation, programming and loading of Tecom Smart Cards and Readers; Alarm handling through a 2 tier response process with individual programmable instructions; flexible database and history reporting schedule and support of multiple card reader technologies. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
The key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
Download5 surprising findings from OT vulnerability assessments
DownloadPalm vein recognition
DownloadPhysical access control
Download