Network door controller

November 2017 Access Control & Identity Management, Products & Solutions

Johnson Controls has introduced the iSTAR Ultra LT door controller from Software House, a special edition iSTAR Ultra door controller that provides a full IP architecture and enterprise level features for small to mid-sized access control deployments.

iSTAR Ultra LT centralises all access control decision processing and secures network communications while allowing end users to use existing infrastructure and Power over Ethernet capabilities to reduce costs. With a scalable architecture that includes support for up to eight card readers and 500 000 cardholders, iSTAR Ultra LT is ideal for businesses seeking a flexible, future-proof access control system that can be expanded as needed.

iSTAR Ultra LT’s control module maintains the local access control database and makes all access decisions, centralising access control management for operators. It can be shared with several Ethernet door modules, providing added costs savings. Its advanced encryption and authentication ensure that communications between access controllers and doors are cyber secure, and it also includes a Bluetooth Low Energy (BLE) smartphone application that allows operators to easily configure and manage controllers and locks, lowering commissioning, and saving time and effort.

Said Rafael Schrijvers, access control product marketing manager, EMEA, Building Technologies & Solutions, Johnson Controls, “iSTAR Ultra LT’s enhanced cybersecurity, IP architecture and generous scalability provide our customers with the building blocks they need for the future.”

Similar to iSTAR Ultra, iSTAR Ultra LT combines support for traditional hard-wired access control doors with support for wireless lock sets, all in the same controller. Ultra LT supports both ASSA ABLOY Aperio and Schlage NDE, AD300 and AD400 wireless locks for added flexibility and installation savings and use of the controller’s PoE Plus capabilities lowers installation costs further. It includes two gigabits of memory and 16 gigabits of storage, as well as a single host/database connection for every eight doors.

End users can use iSTAR Ultra LT with the C•CURE 9000 Security and Event Management platform from Software House.

For more information contact Johnson Controls Security Products, +27 (0)82 566 5274, [email protected], www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New fire blanket for lithium-ion battery fires
Fire & Safety Products & Solutions
SafeQuip launched its newly developed range of high-performance, multi-use lithium-ion battery fire blankets, specifically designed to address fires involving devices with lithium-ion batteries, providing a crucial tool for safety in environments where these batteries are in use.

Read more...
SafeQuip launches lithium-ion battery fire extinguishers
Fire & Safety Products & Solutions
[Sponsored] SafeQuip has launched the SANS 1910-2022 approved Lith-Ex fire extinguisher range, which carries NTA 8133:2021 (KIWA/POOO55865) test approval, which proves its lithium-ion battery fire extinguishing capability.

Read more...
Watermist suppression in mining
FS Systems Fire & Safety Mining (Industry) Products & Solutions
Watermist suppression systems are highly effective in suppressing flames and controlling heat spread, especially in confined spaces commonly found in mining environments, by generating fine droplets with an increased surface area, enabling rapid heat absorption and cooling during fire incidents.

Read more...
FS partners with Oculus
FS Systems Fire & Safety Products & Solutions
FS Systems announced a strategic partnership with Oculus Innovations to combine the company’s integrated security management solutions with Oculus Innovations’ expertise in designing state-of-the-art control room environments.

Read more...
Quality fire detection installation at Baywear Clothing
G2 Fire Fire & Safety Industrial (Industry) Products & Solutions
JZL Projects and Solutions was asked to provide a comprehensive yet cost-effective and reliable fire detection solution for Baywear Clothing that would be installed with minimum disruption to the factory.

Read more...
From wireless alarms to smart homes
Elvey Security Technologies Perimeter Security, Alarms & Intruder Detection Products & Solutions
The final brand SMART Security Solutions features in its discussions with companies operating in South and southern Africa’s detection and alerting technologies market is DSC, distributed in the region by Elvey Security Technologies.

Read more...
The AX Hybrid PRO Series offers reliable wired and wireless protection
Hikvision South Africa Editor's Choice Perimeter Security, Alarms & Intruder Detection Products & Solutions
Hikvision has announced the launch of a new AX Hybrid PRO alarm system with innovative Hikvision ‘Speed-X’ transmission technology. This system offers reliable wired protection while delivering expanded flexibility with seamless wireless integration.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...