Network door controller

November 2017 Access Control & Identity Management, Products & Solutions

Johnson Controls has introduced the iSTAR Ultra LT door controller from Software House, a special edition iSTAR Ultra door controller that provides a full IP architecture and enterprise level features for small to mid-sized access control deployments.

iSTAR Ultra LT centralises all access control decision processing and secures network communications while allowing end users to use existing infrastructure and Power over Ethernet capabilities to reduce costs. With a scalable architecture that includes support for up to eight card readers and 500 000 cardholders, iSTAR Ultra LT is ideal for businesses seeking a flexible, future-proof access control system that can be expanded as needed.

iSTAR Ultra LT’s control module maintains the local access control database and makes all access decisions, centralising access control management for operators. It can be shared with several Ethernet door modules, providing added costs savings. Its advanced encryption and authentication ensure that communications between access controllers and doors are cyber secure, and it also includes a Bluetooth Low Energy (BLE) smartphone application that allows operators to easily configure and manage controllers and locks, lowering commissioning, and saving time and effort.

Said Rafael Schrijvers, access control product marketing manager, EMEA, Building Technologies & Solutions, Johnson Controls, “iSTAR Ultra LT’s enhanced cybersecurity, IP architecture and generous scalability provide our customers with the building blocks they need for the future.”

Similar to iSTAR Ultra, iSTAR Ultra LT combines support for traditional hard-wired access control doors with support for wireless lock sets, all in the same controller. Ultra LT supports both ASSA ABLOY Aperio and Schlage NDE, AD300 and AD400 wireless locks for added flexibility and installation savings and use of the controller’s PoE Plus capabilities lowers installation costs further. It includes two gigabits of memory and 16 gigabits of storage, as well as a single host/database connection for every eight doors.

End users can use iSTAR Ultra LT with the C•CURE 9000 Security and Event Management platform from Software House.

For more information contact Johnson Controls Security Products, +27 (0)82 566 5274, emallett@tycoint.com, www.tycosecurityproducts.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
Bringing fire safety closer to home
SafeQuip Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.