Download PDF version Contact company

Software House, part of the Security Products business unit of Tyco, introduces iSTAR Ultra, an 8 or 16 reader network door controller built on Linux for improved security and scalability.

Ideal for enterprise and government applications, iSTAR Ultra supports extended card formats of up to 256 bits, providing flexibility when configuring custom card formats. These extended card formats are stored locally allowing the controller to make important access control decisions even when offline.

With its wall and rack-mount options, iSTAR Ultra offers flexibility for installations, helping to conserve valuable server room space.  An ideal choice for areas that have many readers in close proximity to the panel, iSTAR Ultra also supports up to 16 RS-485 ports, allowing installers to maximize distances to each door.

“iSTAR Ultra moves the Software House controller technology into a true appliance-based platform, providing higher levels of security,” said Jason Ouellette, Director of Product Management, for Software House. “iSTAR Ultra also provides lock power management built into the controller to help decrease overall installation costs while increasing the capacity of the controller. This controller is critical as the foundation of our embedded architecture, which will enable cloud-based access control solutions in the future.”

The iSTAR Ultra’s unique lock power management features eliminate the need for separate lock power interface boards. For example, feeds to your locks can be used for different voltages or for battery and non battery-backed power sources to comply with certain local life safety codes.

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How Do New Security Technologies Transform Retail And Loss Prevention?
How Do New Security Technologies Transform Retail And Loss Prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...