AC2000 Security Management System

February 2014 Access Control & Identity Management

CEM Systems, part of the Security Products business unit of Tyco, announced the release of version 6.8 of AC2000, AC2000 Airport and AC2000 Lite integrated access control and security management software. The latest release offers a host of new features that increase the performance and improve the functionality of the CEM AC2000 access control system.

“This latest software release spans all three systems including AC2000, AC2000 Airport and AC2000 Lite. The new features and functionality not only improve the user experience but also improve business efficiency,” said Andrew Fulton, senior director of global sales, CEM Systems. “This release provides enhanced AC2000 WEB functionality, and brings intelligence to the edge with the emerald touch screen access terminal, allowing businesses to improve effectiveness and efficiency by accessing applications directly and securely over the Internet and at the door.”

AC2000 v6.8 brings new and enhanced functionality to emerald, CEM’s touchscreen intelligent access terminal. emerald features a reader and controller in one, integrated VoIP (Voice over IP) intercom and a range of remote applications that enable elements of AC2000 software to be accessed directly and securely at the door. AC2000 v6.8 emerald enhancements include a unique Entry Checklist Mode feature, enhanced advertising/information announcements and new remote applications.

Entry Checklist Mode enables emerald to display a sequence of images and questions relating to business requirements such as security or health & safety, that users must answer correctly before the door will open. For example on a construction site, these questions might include, are you wearing a hard hat? Are you wearing a high visibility vest? If the employee answers No to any of the mandatory questions the door will not open. This enables the business to enforce their health & safety policy at the edge of their access control system.

emerald now has the ability to display rotating advertisements or information announcements. This feature can be used to display health & safety notices or company updates, as well as advertisements which businesses can use to assist in revenue generation.

The suite of emerald remote applications now includes a Room Booking application where the user can use emerald to view or book a meeting room directly at the door. This Room Booking application is also available as an AC2000 WEB application, allowing users to view and make a room booking on their PC or tablet via a standard Internet browser.

New to AC2000 WEB reports in AC2000 v6.8 is an Absentee Report which lists all cardholders who have not swiped into the building, providing managers with quick access to vital staff information. Card holder records are now accessible via the Internet using the new WEB Personnel application, enabling system administrators to quickly add, search and edit AC2000 cardholder records from a standard Internet browser.

For more information contact Tyco Security Products, +27 (0)82 566 5274,  [email protected] www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...