Network door controller

November 2017 Access Control & Identity Management, Products & Solutions

Johnson Controls has introduced the iSTAR Ultra LT door controller from Software House, a special edition iSTAR Ultra door controller that provides a full IP architecture and enterprise level features for small to mid-sized access control deployments.

iSTAR Ultra LT centralises all access control decision processing and secures network communications while allowing end users to use existing infrastructure and Power over Ethernet capabilities to reduce costs. With a scalable architecture that includes support for up to eight card readers and 500 000 cardholders, iSTAR Ultra LT is ideal for businesses seeking a flexible, future-proof access control system that can be expanded as needed.

iSTAR Ultra LT’s control module maintains the local access control database and makes all access decisions, centralising access control management for operators. It can be shared with several Ethernet door modules, providing added costs savings. Its advanced encryption and authentication ensure that communications between access controllers and doors are cyber secure, and it also includes a Bluetooth Low Energy (BLE) smartphone application that allows operators to easily configure and manage controllers and locks, lowering commissioning, and saving time and effort.

Said Rafael Schrijvers, access control product marketing manager, EMEA, Building Technologies & Solutions, Johnson Controls, “iSTAR Ultra LT’s enhanced cybersecurity, IP architecture and generous scalability provide our customers with the building blocks they need for the future.”

Similar to iSTAR Ultra, iSTAR Ultra LT combines support for traditional hard-wired access control doors with support for wireless lock sets, all in the same controller. Ultra LT supports both ASSA ABLOY Aperio and Schlage NDE, AD300 and AD400 wireless locks for added flexibility and installation savings and use of the controller’s PoE Plus capabilities lowers installation costs further. It includes two gigabits of memory and 16 gigabits of storage, as well as a single host/database connection for every eight doors.

End users can use iSTAR Ultra LT with the C•CURE 9000 Security and Event Management platform from Software House.

For more information contact Johnson Controls Security Products, +27 (0)82 566 5274, emallett@tycoint.com, www.tycosecurityproducts.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Intelligent access at the gate
Access Control & Identity Management Residential Estate (Industry)
LD Access provides a smart, streamlined approach to boom gate security, enhancing the verification of people and vehicles before entry. Through its Self-Service Scanning Kiosk and Mobile Scanning Unit, LD Access delivers secure, automated access control.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Proactively enhancing campus safety
Surveillance Products & Solutions
Strengthening security management and proactive alerting have become priorities for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.