C•CURE 9000 delivers the best access control while empowering customers to utilize IT-standard
tools and distributed architecture. The flexibility of this system grants security professionals
the freedom to deploy a unique security solution for their entire business.
C•CURE 800/8000 Access Control + Security Management Solutions
C•CURE 800/8000 is a scalable security management solution encompassing complete access control and advanced
event monitoring. As the foundation for security management, C•CURE 800/8000 integrates highly advanced technologies
to provide the most powerful solution on the market.
C•CURE Migration Featuring Data Migration and Replication Utilities
Whether a migration takes several weeks to complete or goes on for multiple months,
Software House provides the tools and expertise necessary to have a successful migration from an existing
C•CURE 800/8000 system to new C•CURE 9000 system. With the latest data migration and replication utilities,
it's easier than ever to successfully migrate to the robust feature set and scalable architecture of C•CURE 9000.
• Migrate an existing C•CURE 800/8000 to C•CURE 9000
• Replicate personnel data on a continuous basis
• Supports phased approach
• Reduce data entry time, potential errors, and labor costs
• Consolidate reporting across multiple systems using the Business Intelligence Reporting Suite (BIRS)
The suite of iSTAR door controllers, including iSTAR Edge, iSTAR Pro, iSTAR eX and iSTAR Ultra,
and iSTAR Ultra SE, provides powerful, network-ready solutions for enterprise-wide access control.
Featuring advanced encryption and backup communication paths, the iSTAR design is among the industry’s
most reliable and secure. The iSTAR Pro, iSTAR Ultra, and iSTAR Ultra SE models are also available in
space saving rack mount models.
Providing high performance, intelligent access control and alarm monitoring functionality,
the Software House apC controllers are ideal for organizations large or small. The apC/8X is best
suited for larger organizations while apC/L, the two-reader version, is more suited for smaller
installations such as retail outlets and apartment complexes.
Power to a security system is critical. Software House offers several power supply options that not
only address the critical need for uninterrupted power for your access control system, but gives users
immediate notification when an out-of-normal condition occurs, keeping downtime to a minimum.
C•CURE 9000 security and event management system integrates with ASSA ABLOY wireless
IP-enabled Wi-Fi and PoE Locks, and Aperio wireless lock technology creating a cost-effective and
scalable access control solution. The integrations offer the same real-time communication as traditional
access control locks without the inconvenience of wiring the door.
Software House offers a wide range of proximity readers designed to fit the specific requirements of access
control systems. Our readers are compatible with the leading proximity card brands including HID®.
The demand for biometric readers has been on the rise as people endeavor to keep their lives and work environments
more secure without compromising user convenience. Learn how fingerprint readers can improve facility security
without compromising user convenience.
Software House teams up with Entertech Systems to offer a series of Suprema
biometric readers to their portfolio including: FaceStation, BioStation, BioStation T2, BioEntry Plus,
BioEntry W and BioLit Net, all fully integrated with C•CURE 9000 through BioConnect. These indoor and outdoor biometric
solutions are durable, easy to install, and offer industry leading fingerprint recognition technology.
In busy environments like casinos, Kantech door controllers
help to prevent the public from wandering into restricted areas
where they don’t belong. You can make security and building operations
even more effective by integrating our door controllers with alarm panels,
HVAC systems, and CCTV systems, such as those from American Dynamics.
The Kantech door controller range offers support for single door
installations (using the KT-1 one door controller), as well as medium to large sized installations.
Choosing an access control system doesn’t have
to require hours spent sorting through hundreds of
software, hardware, and reader offerings. Kantech’s
Access Control Kits include all of the components you
need to get up and running quickly and easily.
With T. Rex request to exit detector and PB-EXIT control button,
Kantech creates a new standard and provides a complete solution to exit
detection and door surveillance for access control applications.
Proximity readers continuously transmit a low-level fixed radio frequency
(RF) signal that provides energy to the card. When the card is held at a certain
distance from the reader, the RF signal is absorbed by a small coil inside the
card that powers up the card’s microchip which contains a unique identification code.
Once powered, the card transmits the code to the reader. The whole process is
completed in microseconds. The big advantage of proximity over other technologies
lies in its simplicity. There are no moving parts, no mechanical wear, no slots,
and no read heads to maintain. The reader can be concealed inside walls or special
enclosures and poses even fewer problems when surface-mounted because it has no opening
with which to jam or tamper. The proximity card is extremely secure and practically
impossible to duplicate. Proximity cards are less prone to physical damage or loss,
saving you money in reduced card replacement costs. Read ranges depend primarily on the reader.
The larger the read range, the larger the reader’s concealed antenna and, hence,
the size of the reader. A reader’s read range is always specified using standard cards.
If the card’s coil is smaller, as in thin photo ID cards, keytag or keytag type cards,
it may reduce the read range by up to 40%. There is a great variety of proximity readers
designed for different environments including vandal resistant mullion mounts, smaller
decor styles, and integrated keypad/reader units.