25.02.2014 Views

C-CURE Product Catalogue Issue 1

C-CURE Product Catalogue Issue 1

C-CURE Product Catalogue Issue 1

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

iSTAR TM Intelligent Network Controller<br />

(Up to 16 doors per controller)<br />

C•<strong>CURE</strong> 800<br />

iSTAR is an Ethernet-ready embedded control panel for<br />

enterprise-wide security management. iSTAR operates with<br />

Software House’s RM Reader Services as well as industry<br />

standard Wiegand readers. Intended for use by both<br />

corporate security and information technology managers,<br />

the iSTAR controller represents a new way to organise and<br />

deploy security management solutions by seamlessly<br />

integrating with an existing network infrastructure.<br />

Designed with the network in mind, the iSTAR controller<br />

enables integration of various event management<br />

applications into one single embedded controller.<br />

At the heart of iSTAR is the General Controller Module<br />

(GCM). The GCM integrates Microsoft’s Windows® CE<br />

operating system, Motorola’s Power PC TM processor,<br />

network and communication ports, expandable memory and<br />

a PC Card type III slot. The GCM also supports up to two<br />

Access Control Modules (ACM) for versatile reader system<br />

integration. ase event-directed actions can be downloaded<br />

to the controller from the C•<strong>CURE</strong> 800/8000 database and<br />

journal host. Communications among multiple iSTARS can<br />

point-to-point via TCP/IP over Ethernet. Remote dial-up is<br />

also an option as a secondary back-up communications<br />

path. The advantaged access control networking allows<br />

ISTAR controllers to efficiently communicate directly to one<br />

another without host polling or intervention.<br />

Note: C•<strong>CURE</strong> 800/8000 v.5.2 or higher and complete training is required; all dealers<br />

must complete training on iSTAR system prior to purchasing.<br />

Ethernet Ready- Direct Ethernet connection with each<br />

iSTAR retaining a unique IP address. ISTAR can be<br />

deployed in clusters. A cluster can incorporate multiple<br />

panels employed over a WAN, allowing the cluster to<br />

include controllers in geographically disparate locations.<br />

Embedded Operating System. - Microsoft Windows CE<br />

and Motorola Power PC processor broaden application<br />

support and enhance speed.<br />

Seamless Integration - DHCP allows for automatically<br />

obtaining IP addresses: the C•<strong>CURE</strong> 800/8000 host networks<br />

for initial database set-up, managing peripheral<br />

hardwdare, generating activity reports, and managing<br />

multi-cluster events.<br />

Wide Range of Alarm Monitoring - Supports 2 ACMs,<br />

each providing 16 supervised inputs and 8 relay outputs<br />

(readers); i/8 and R/8 allow each additional input and output<br />

modules.<br />

Advanced Clustering for Unmatched Event Control and<br />

monitoring - Distributed management is supported<br />

through communications within a cluster.<br />

Database Backup on Power Failure - Eliminates the need<br />

to re-download entire database after power loss.<br />

Anti-Passback within A Cluster - stops or restricts access<br />

of personnel attempting to utilise the same security<br />

badge.<br />

Password Protected Web Based Diagnostics - Remote<br />

diagnostics utilising any networked computer, Web<br />

browser, and known iSTAR IP address.<br />

Expandable On-Board memory - On board memory<br />

options supporting expanded databases/events and<br />

future add-on functionality. 32Mb and 64Mb SIMM field<br />

upgradeable configurations available.<br />

Secure Communications - Industry tested encryption and<br />

multi-key authentication for enhanced security.<br />

System for the Future - Easily upgradeable flash ROM<br />

with future releases and iSTAR specific extended applications<br />

such as enhanced Intrusion Zones and Keyboard<br />

Commands.<br />

Worldwide Compliance - FCC, CE, C-TCK, UL 294 and UL<br />

1076.<br />

27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!