C•CURE 800/8000 v10.2

C•CURE 800/8000 v10.2
A Ty c o I n t e r n a t i o n a l C o m p a n y
C•CURE 800/8000 v10.2
Security Management Solution
Features That Make a Difference:
•
NEW! Seamlessly integrates with :
−− Intellex v5.0
−− VideoEdge v4.01
Complete Integration
Easy to Network
C•CURE 800/8000 client workstations and
iSTAR intelligent network controllers can be
placed directly on an existing network and
across a WAN. iSTAR controllers support
dual network connectivity and DHCP, easing
connectivity to most existing networks.
•
Quickly access and leverage LDAP
compliant data sources
C•CURE 800/8000 is a scalable security
management solution encompassing
complete access control and advanced
event monitoring. The system integrates
with critical business applications including
CCTV and video systems from American
Dynamics (Intellex, VideoEdge and HDVR),
visitor management, ERP, HR/time and
attendance, and third party devices such
as fire alarms, intercoms, burglar, and other
alarms.
•
Microsoft® Windows® login authentication
provides enhanced security and password
management
Ideal for Government and
Enterprise Customers
−− American Dynamics HDVR v1.2
•
Easily create reports on personnel with
specific clearances
•
Wildcard feature simplifies searches in
various administration sub-sections
•
Display audit journal reports in Excel format
for quick export
Whether it’s specifically complying with
FIPS regulations or ensuring that safety
precautions are augmented when critical
security events occur, C•CURE 800/8000
meets today’s most stringent security and
administrative needs. In addition, C•CURE
800/8000 supports the iSTAR eX Ethernetready controller1 (four- or eight-door) and
the iSTAR Edge Ethernet-ready controller
(two-door) to provide a solution for any
government or enterprise application.
C•CURE 800/8000 also supports LDAP,
which allows a user to connect to many
external data sources including Microsoft
Active Directory. By importing vital personnel
information from an LDAP directory into
C•CURE 800/8000 the customer is assured
that the information in both systems is
precisely matched and clearances are in
place.
Accountability and Auditing
A comprehensive audit trail is critical for
organizations such as pharmaceutical and
healthcare facilities, that must comply with
process regulations. C•CURE 800/8000’s
field-level audit trail enhances the control
you have of data and maintains system
integrity by tracking changes made to
all relevant security objects, including
configuration and clearance data.
Unlimited Scalability
With the C•CURE 800/8000 central
monitoring option, users can monitor
multiple widely dispersed locations from
a single monitoring station providing total
enterprise security management. C•CURE
800/8000 is completely scalable and lets
you easily add functionality and increase
capacity as your security needs grow. Using
Microsoft .MSI standard installer technology
with C•CURE 800/8000, you can easily
install, upgrade, and repair remote
workstations conveniently without visiting
every site.
(1) C•CURE 800/8000 supports the entire suite of Software House iSTAR and apC controllers (excluding iSTAR Edge 4-door)
www.swhouse.com
Take a closer look
Advanced Event and Alarm Monitoring
Powerful Database Partitioning
The C•CURE 800/8000 monitoring station displays cardholder
images based on granted/rejected access or events. For
added convenience, you can name, prioritize, and sort alarms
as they occur right at the C•CURE 800/8000 monitoring
station. For example, you can name your alarm categories
“1-Life Safety, 2-SCI, 3-DoD, and 4-General” in place of the
default Critical, High, Medium, and Low, to customize the
interface based on your security parameters. You can also
easily sort alarms by priority and/or date and select from up to
eight unique predefined labels and more than 16 million colors
for coding priorities.
C•CURE 800/8000 allows groups to share a single database
while, at the same time, partitioning to maintain individual groups’
security. Partitioning supports multiple tenant locations at one
site or it can support a single organization occupying multiple
buildings. This ensures that security officials have access only to
information that is pertinent to their facility.
A powerful dual acknowledgment screen lets you retain a
record of events after all of the active causes have been
resolved. It’s an extremely effective way to manage new
alarms as they arise without losing track of those still under
investigation.
Footnote
Integration Ensures Total Control
Using the powerful API, C•CURE 800/8000 provides seamless
integration with select video systems and recorders including
those from American Dynamics (Intellex, VideoEdge and HDVR)
via its NetVue application. This integration allows you to tie
an event generated on C•CURE 800/8000 to live video. With
enhanced alarm management, NetVue can automatically activate
C•CURE 800/8000 events based on motion detection alarms
received from a video system. Refer to the C•CURE NetVue
datasheet on www.swhouse.com for more detailed information.
For other integrations such as fire panels and intrusion detection
systems, the bi-directional serial interface can be used to receive
and interpret messages sent to C•CURE 800/8000. These
messages can trigger events and generate a journal entry on the
monitoring station. The interface can communicate with C•CURE
800/8000 via an RS-232 serial port or remotely through TCP/IP
via a qualified terminal server.
Data Consistency Across
Various Applications
Easily Create CHUIDs with
Extended Card Number Support
Companies often store personnel information in multiple
databases and need to keep these databases synchronized.
To prevent possible inconsistencies, you can use the ODBC
functionality of C•CURE 800/8000 to import personnel data,
including roles or clearances, from external ODBC-compliant
data sources.
C•CURE 800/8000 supports extended card numbers2 which
allow users in government applications to comply with certain
federal guidelines (such as FIPS 201) that require a multi-field
CHUID. In addition, iSTAR controllers support card numbers
of up to 256 bits, eliminating the need for multiple facility
codes, site codes, or offset in order to avoid card duplication.
Longer card numbers offer greater protection against card
duplication and are especially valuable to customers who
require card numbers that exceed ten digits.
Additionally, you can use the API to import and export
personnel data, including roles and clearances (based on
personnel roles), from a particular outside data source in real
time.
Intrusion Zones and Keypad
Commands Enhance Security
Grouping inputs and doors into intrusion zones allows you to
easily arm and disarm alarm monitoring points (inputs). You
can also lock and unlock groups of doors while displaying
their current mode of status. Use keypad commands to
remotely activate cameras, doors, and other events as well
as trigger a duress call right from the RM reader keypad.
Additionally, triggering a duress call, sounding an alarm,
and more can be performed from an RM reader keypad
connected to an iSTAR controller. Keypad commands can
be configured to require a card presentation and/or a PIN to
validate the command.
Intrusion zones can be disabled while keeping critical inputs
active 24 hours a day, 7 days a week. For example, the first
floor of an office building has an intrusion zone with motion
and glass-break detectors in place. It is crucial for the
glass-break detectors to be active but unnecessary for the
motion detectors to be active during normal business hours.
You control what state those inputs need to be in; in this
case, the motion detectors will be disabled. However, should
there be a window break within that zone, the glass-break
detector will trigger an alarm.
Footnote
(2) Only with iSTAR controller
Multiple Cards, Multiple Formats
C•CURE 800/8000 lets you assign up to five cards per
cardholder record instead of creating a separate record for
each card. Using this powerful feature, you can assign a PIN
as one of the cards, providing a flexible and secure solution
and greatly simplifying the management and maintenance of
personnel records.
For additional flexibility, you can use iSTAR controllers to
support up to 128 card formats system-wide and ten card
formats per reader. This expanded ability to use multiple card
types (such as 26-bit, 37-bit, or 35-bit Corporate 1000) at a
single reader frees you from having to consolidate or re-issue
new cards.
Manage Occupancy
Threat Level Support
Once someone is granted access to the building the real work
begins to ensure that confidential areas are kept protected,
occupancy levels are maintained for safety, and the general
well-being of employees and visitors is ensured. With
C•CURE 800/8000, you can easily configure all of the areas
in your building and across multiple buildings and identify
inbound and outbound readers to enforce anti-passback.
This prevents someone from passing his/her access card
back to another person for unauthorized entry, using either a
timed or event-driven configuration. The area lockout feature
operates similarly but takes it a step further by actually locking
a cardholder out of an area based on a decrementing time
specification.
C•CURE 800/8000 allows government agencies and
enterprise companies to change the operation of the security
system based on a threat level. For example, if the national
threat level (defined as “Low”, “Guarded”, “Elevated”, “High”,
and “Severe”) is raised, the administrator can react by
changing the threat levels in the C•CURE 800/8000 system,
which may then be configured to react in the following
user-defined ways:
Managing occupancy levels is another powerful tool
that lets you define how many people and/or what type
of person is allowed in a room. This type of control is
essential for extremely classified areas, such as Secured
Compartmentalized Information Facilities (SCIFs), which
exist most often in the government-related marketplace. In
these sensitive areas you can configure C•CURE 800/8000
to require a supervisor to be present before allowing an
employee to enter. This type of restriction can also apply
to visitors who may require an escort as they pass through
restricted doors.
•
Cardholders may be required to present a higher
level of credential to gain access to a door
•
Operators or guards may need to validate their
manual actions with an approved response
•
Events may be automatically activated
•
Current threat level color is displayed on maps and the
monitoring station for consistent reminder of status
•
An escort may be required
MODEL 1
MODEL 5
MODEL 10
MODEL 20
MODEL 30
MODEL 40
8000
Enterprise
Server
8000Plus
Enterprise
Server
Number of Online Readers*
32
64
128
256
512
1000
2500
*
Number of Online Inputs
128
256
512
1024
2500
5000
10000
*
Number of Online Outputs
128
256
512
1024
2500
5000
10000
*
Number of Addressable
Controllers
No limit
No limit
No limit
No limit
No limit
No limit
No limit
No limit
Number of Cardholders*
10K
40K
40K
250K
250K
250K
500K
500K
Number of Assets
N/A
40K
40K
250K
250K
250K
500K
500K
2
3
4
8
16
64
128
128
Number of Client PCs
Definable on Server
999
999
999
999
999
999
999
999
Sentinel Required
YES
YES
YES
YES
YES
YES
YES
YES
Number of Simultaneous
Client PCs Included with Server
* C•CURE 800/8000 is designed for unlimited expansion. The often stated 3,000 reader and 32,000 input/output handling are tested limits only and do not represent expansion
restrictions. System performance will vary depending upon specific hardware configuration including number of communication lines/ports, download/upload frequency, etc.
Footnote
Graphical Interface
C•CURE 800/8000’s map interface allows you take any CAD
drawing or Visio file, save it as .bmp, and then populate your
map with icons that reflect security objects, such as doors,
inputs, outputs, cameras, events, video tours, and views. You
can also nest maps within maps to provide an easy interface
that lets you travel graphically around your facility and manage
events directly from the map.
Specialized display needs for badge layouts are common
and the Expression Builder can help you meet those needs.
You can simply pick fields from a list that builds sophisticated
expressions without ever having to understand the complexity
of expressions.
At the monitoring station, you’ll immediately see the benefits
of the mapping feature when a critical event such as “Door
Forced Open” occurs. This event can cause a live video
window to automatically pop-up on the map, giving you
the exact location and corresponding video footage. Here,
the nested maps come in handy to help you drill down and
graphically navigate through the facility looking for the person
who may have caused the “Door Forced Open” event. Using
the dynamic icons and the powerful NetVue interface, you can
even launch a video tour of the affected area to immediately
investigate.
Intuitive Badging
Access control cards are essential for security, but can also
be a nice way to communicate your company’s message to
employees and the public. The C•CURE 800/8000 badging
solution utilizes Microsoft’s .NET guidelines for the graphical
user interface and offers superior control of color and
graphics.
Footnote
With the smart card enrollment solution, you can read and/
or reprogram multiple smart card formats such as MIFARE®
(1k & 4k cards), iCLASS®, and DESFire®. These cards can
be programmed with a wide range of data depending on the
protocol of each card type for critical security purposes and/
or value add-ons such as vending, parking, etc. Refer to
the C•CURE ID datasheet on www.swhouse.com for more
detailed information.
Dynamic Clearance Filters
Assign a clearance filter number to personnel which matches
the clearance filter number of the reader in a protected area.
For example, an operating room may be accessible to all
hospital personnel during non-surgery times. At these times,
the reader that secures the room has a clearance number of
“1” and each person with a clearance filter number “1” can
gain access. During operations, however, the clearance filter
on the reader automatically changes to a “3”, which means
only those personnel who have a clearance filter of “3” will
be permitted access. This is done without changing the
underlying clearance available to the area.
A Ty c o I n t e r n a t i o n a l C o m p a n y
C•CURE 800/8000 Server Specifications
Processor
Model Number 1 through 10
Model Number 20 through 40
Model Number 8000 and 8000 Plus
Free Hard Disk Space
Model Number 1 through 10
Model Number 20 through 8000 Plus
Memory
Model Number 1 through 10
Model Number 20 through 40
Model Number 8000 and 8000 Plus
Network Adapter Card
Model Numbers 1 through 8000 Plus
Video Adapter Card
Model 1 through 10
Model 20 through 8000 Plus
Monitor/Video Adapter Board
Minimum
Recommended
1.5 GHz Intel® Pentium IV or higher
1.8 GHz Intel Pentium IV or higher
2.4 GHz Intel Pentium IV or higher
Intel Core 2 Duo E8400, 3.0 GHz or higher
Intel Xeon E5506 Processor, 2.13 GHz or higher3
Intel Xeon E5620 Processor, 2.40 GHz or higher
4.0 GB
4.0 GB
Two 160 GB
Four 160 GB
1 GB RAM
1 GB RAM
2 GB RAM
3 GB RAM; 4 GB RAM (Windows 7 and Windows 2008 R2)
4 GB RAM; 8 GB RAM (Windows 7 64-bit and Windows 2008 R2)
4 GB RAM; 8 GB RAM (Windows 7 64-bit ); 16 GB (Windows 2008 R2)
100 MB or higher
Gigabit NIC
Integrated 64 MB available memory or equivalent
Integrated 64 MB available memory or equivalent
17” SVGA (1024 x 768)
True color support for badging
256 ATI Radeon HD3470 graphics or equivalent
Integrated MATROX G200 with 8 MB sheared video memory or equivalent
17” SVGA (1024 x 768)
True color support for badging
2X
2X
Windows Server 2008 Standard and Enterprise (SP2 or later),
Windows Server 2003 Standard and Enterprise (SP2 or later),
Windows XP Professional (SP3 or later),
Windows Vista Business and Enterprise (SP2 or later),
Windows 7 Professional and Enterprise (32- and 64-bit)
Windows 2008 R2 Standard and Enterprise (64-bit)
Windows Server 2008 Standard and Enterprise (SP2 or later),
Windows Server 2003 Standard and Enterprise (SP2 or later),
Windows XP Professional (SP3 or later),
Windows Vista Business and Enterprise (SP2 or later),
Windows 7 Professional and Enterprise (32- and 64-bit)
Windows 2008 R2 Standard and Enterprise (64-bit)
DVD Drive
Operating System (32-bit unless otherwise specified)
PS/2 bus type, USB
PS/2 bus type, USB
Ports
1 USB dedicated to sentinel or
1 parallel dedicated to sentinel
At least one USB port (or parallel port) for sentinel,
dual serial ports (if needed)
Backup
Tape or CDRW, Shared drive,
network storage device, or DVD
DVD+/-RW
Modem
Dial-in Client or iSTAR: Any modem supported by Windows
apC Dialup: Software House OEM Multi-Technology for apCs
56.7 Kbps
Mouse
Sentinel
Supplied by Software House
Supplied by Software House
Digiboard
Eight port (Models 20/30/40)
Eight port (Models 20/30/40)
C•CURE 800/8000 Client Specifications
Processor
Free Hard Disk Space
Minimum
Recommended
Intel Pentium IV 2.0 GHz or higher
Intel Pentium IV 2.0 GHz or higher
2 GB; 16 GB (Windows 7 32-bit); 20 GB (Windows 7 64-bit;
32 GB (Windows 2008 R2 64-bit)
20 GB; 30 GB (Windows 7 and Windows 2008 R2)
Memory
Model Number 1 through 10
Model Number 20 through 40
Model Number 8000 and 8000 Plus
Network Adapter Card
For all models
1 GB RAM4
100 MB or higher
10X
10X
17” SVGA (1024 x 768), 64 MB RAM
17” SVGA (1024 x 768), 64 MB RAM
Windows Server 2003 Standard and Enterprise (SP2 or later)
Windows 2008 Standard and Enterprise (SP2 or later)
Windows 2008 R2 Standard and Enterprise (64-bit)
Windows XP Professional (SP3 or later)
Windows Vista Business and Enterprise (SP2 or later)
Windows 7 Professional and Enterprise (32- and 64-bit)
Same as minimum
CD-ROM Drive
Monitor/Video Adapter Board
Operating Systems
(32-bit unless otherwise specified)
2 GB RAM5
3 GB RAM
4 GB RAM
10/100/1000Base-T
(3) Intel Xeon E5506 @ 2.13 GHz or higher for Windows 7 and Windows 2008 R2
(4) 2 GB RAM for Windows 7 and Windows 2008 R2 64-bit
(5) 3 GB RAM for Windows 7 and Windows 2008 R2
Related Products
C•CURE ID
VideoEdge
Approvals
C•CURE
Central
iSTAR Edge
Intellex
www.swhouse.com
The trademarks, logos, and service marks displayed on this document are registered in the United States [or other countries]. Any misuse of the trademarks is strictly prohibited and Tyco International Ltd. will aggressively
enforce its intellectual property rights to the fullest extent of the law, including pursuit of criminal prosecution wherever necessary. All trademarks not owned by Tyco International Ltd. are the property of their respective owners,
and are used with permission or allowed under applicable laws.
Product offerings and specifications are subject to change without notice. Actual products may vary from photos. Not all products include all features. Availability varies by region; contact your sales representative.
© 2011 Tyco International Ltd. and its respective companies. All rights reserved. SH0030-DS-201109-R08-LT-EN
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising