New version of AC2000 Security Management System

November 2014 Access Control & Identity Management

CEM Systems, part of the Security Products business unit of Tyco, has announced the release of version 6.9 of the AC2000 suite of access control and security management software. This new version of the software offers improved security features and increases the performance of the AC2000 software suite including AC2000, AC2000 Airport and AC2000 Lite.

“AC2000 is an integrated security management system that is designed with the customer in mind, providing flexible solutions that help increase security and improve operational effectiveness,” said Conleth Donaghy, senior product manager, CEM Systems. “The latest release of AC2000 further reinforces this, offering improved security features with the addition of the SmartCard Utility and support for AES encryption across all CEM DESfire readers. The latest enhancements to emerald also provide an additional security level, where personnel images can be immediately verified at point of entry.”

An exciting enhancement of AC2000 is the addition of user defined keys through the AC2000 SmartCard Utility application. This application is a convenient and flexible approach to smartcard key management by allowing users to take full ownership of their smartcard personalisation process. This means if encryption keys become compromised, updates can be implemented with minimal impact to security and daily operations using the AC2000 SmartCard Utility.

AC2000 v6.9 now also supports 128-bit AES (Advanced Encryption Standard) encryption across the CEM DESFire reader versions of the emerald terminal, the S610 reader range and the sPass reader. This encryption standard provides a future proof access control solution, increasing security and reducing the risk of card cloning.

Version 6.9 of AC2000 also offers enhanced functionality of emerald, CEM’s intelligent access terminal. emerald is a touch screen reader and controller in one, with built in Voice over IP (VoIP) intercom functionality, that uniquely enables AC2000 data to be accessed securely at the door. With the release of AC2000 v6.9, emerald now supports Image on Swipe mode, which allows the terminal to display the cardholder’s image, and grants or denies access based on this verification. Also with the release of AC2000 v6.9, emerald remote apps are now more user friendly with new intuitive menus and improved response times.

In v6.9, AC2000 now supports full two-way integration with Exacq’s exacqVision video management system and integration with Future Fibre Technologies’ CAMS 3 perimeter intrusion detection system.

For more information contact Tyco Security Products, +27 (0)82 566 5274, [email protected], www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
IQ Panels now supported by PowerManage
Johnson Controls - (Tyco Security Products) Products & Solutions
IQ Panels, now supported by PowerManage, simplify installation and data management. The PowerManage interactive platform allows for localised data storage, so customer information is not stored in the cloud or exposed to a third party.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...