Tecom TITAN Access control software
Technical Specification

- Make: Tecom
- Model code: TITAN
TITAN is a true 32-bit access control application that provides Windows interface for management, control and monitoring of the entire Challenger range of products. These include access control, alarm monitoring, HVAC, lighting control as well as video imaging system. Some of the other features of the system are: full upload and download capabilities; alarm handling, monitoring and control via graphics maps; Smart Card programmer facilities for the creation, programming and loading of Tecom Smart Cards and Readers; Alarm handling through a 2 tier response process with individual programmable instructions; flexible database and history reporting schedule and support of multiple card reader technologies.
Read moreMake | Tecom |
---|---|
Manufacturer | Interlogix |
Category | Access Control>Access control software |
Model code | TITAN |
Additional info | TITAN is a true 32-bit access control application that provides Windows interface for management, control and monitoring of the entire Challenger range of products. These include access control, alarm monitoring, HVAC, lighting control as well as video imaging system. Some of the other features of the system are: full upload and download capabilities; alarm handling, monitoring and control via graphics maps; Smart Card programmer facilities for the creation, programming and loading of Tecom Smart Cards and Readers; Alarm handling through a 2 tier response process with individual programmable instructions; flexible database and history reporting schedule and support of multiple card reader technologies. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
The ultimate guide to mastering key control
DownloadUsing artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
Download