SOFTWARE HOUSE C-CURE 9000
SOFTWARE HOUSE C-CURE 9000 FOR EVERYONE
The Software House C-CURE 9000 is a powerful and flexible Security and Event Management System (SEMS), and it is much more than just a simple access system. It’s a comprehensive platform designed for mid-to-large enterprise applications. It’s developed by Software House Johnson Controls.
SOFTWARE HOUSE C-CURE 9000
KEY FUNCTIONS AND FEATURES
Access Devices
This is a core function, allowing for advanced management of credentials and privileges. It can enforce sophisticated security policies like Area Control and Occupancy Management (e.g., global anti-passback and occupancy restrictions).
Event Management
It serves as a central hub to monitor and manage security events and system activities in real-time.
Scalability
It is highly scalable, supporting solutions from a single server to an advanced distributed Enterprise Architecture with multiple interconnected servers for global management.
Personnel and Visitor Management
You can manage personnel records, create reports, and handle visitor management (including scheduling and tracking) from a single system thanks to Software House Johnson Controls technology.
Integration Platform
It’s known for its robust integrations, allowing it to seamlessly connect and unify various security and building systems, including: Video Suveillance, Inyrusion Detection, Intercoms, Fire Alarm Management and Physical Security Information Management (PSIM)
User Interface and Access
- It offers a full desktop client, a web-based client (C•CURE Web) for access from any internet browser, and a mobile app (C•CURE Go) for on-the-go administration and monitoring.
- It provides Dynamic Views and Editable Maps to display critical information on user-defined floor plans.
HOW DOES THE SOFTWARE HOUSE C-CURE 9000 WORK?
The Software House C-Cure 9000 system operates on a robust, multi-layered architecture designed to manage physical security for large, complex enterprises.
01. The Core Architecture (Three Layers)
A. The Field Layer (Hardware)
This is where the actual security devices are located:
- iSTAR Controllers: These are the intelligent, network-enabled panels (like the iSTAR Ultra) that manage the doors. They store the access rules, credential data (up to 1 million cardholders), and event logs locally.
- Readers: Devices (card readers, biometric scanners, keypads) that authenticate users at the doors.
- Doors/Locks: Electrified locking devices, door contacts, and Request-to-Exit (REX) sensors.
HOW IT WORKS:
When a cardholder presents a credential, the iSTAR controller instantly checks its local database for clearance. If the access is valid, the controller triggers the lock to open. This means access decisions are made locally and immediately, even if the connection to the central server is lost.
A. The Server Layer (The Brain)
This is the heart of the system, typically running on a Windows Server with a SQL database:
- C•CURE 9000 Server: The main application software. It manages all system configuration, personnel records, security policies (like anti-passback and area control), and alarm workflows.
- Database (SQL Server): Stores all historical data, cardholder information, event logs, and system settings.
- Enterprise Architecture (Optional): For multi-site organizations, the architecture includes a Master Application Server (MAS) that manages global data (personnel, clearances) and multiple Satellite Application Servers (SASs) that control the local site controllers.
HOW IT WORKS:
The server constantly communicates with all iSTAR controllers to synchronize data (sending new cardholder data, receiving event logs). It’s responsible for the overall security logic and integration with other systems (like video surveillance).
HOW IT WORKS:
When a cardholder presents a credential, the iSTAR controller instantly checks its local database for clearance. If the access is valid, the controller triggers the lock to open. This means access decisions are made locally and immediately, even if the connection to the central server is lost.
HOW IT WORKS:
The server constantly communicates with all iSTAR controllers to synchronize data (sending new cardholder data, receiving event logs). It’s responsible for the overall security logic and integration with other systems (like video surveillance).
C. The Client/Monitoring Layer (User Interface)
This is how security operators and administrators interact with the system:
- Full C•CURE Client: The comprehensive desktop application used for deep system configuration, security monitoring, and report generation.
- C•CURE Web (or C•CURE IQ Client): A web-based interface that allows users to perform day-to-day tasks (personnel management, monitoring activity, controlling doors) from any web browser without needing a software installation.
- C•CURE Go Mobile App: Provides on-the-go administration and monitoring from a mobile device.
HOW IT WORKS:
The clients securely connect to the C•CURE 9000 server to display real-time event logs, dynamic views of maps with device statuses, and allow operators to manually respond to alarms (e.g., locking down an area, viewing associated video).
INNOVATION: SOFTWARE HOUSE C-CURE 9000
The Software House C-CURE 9000 system offers numerous benefits for mid-to-large-sized enterprises, focusing on consolidation, scalability, and advanced security management.
BASIC BENEFITS OF SOFTWARE HOUSE C-CURE 9000
Unified and Centralized Security Management
Single Platform: C•CURE 9000 is a powerful Security and Event Management System (SEMS) that goes beyond simple access devices. It unifies control devices system, video surveillance, intrusion detection, fire alarms, and other security systems onto a single, intuitive interface.
Better Decision Making: By consolidating information, security personnel can monitor alarms and system activity from multiple locations simultaneously, leading to faster response times and better-informed decisions.
High Scalability and Robust Architecture
Enterprise-Ready: It is built with an advanced distributed architecture (Enterprise) that allows it to grow with your company, supporting systems with numerous locations and a massive number of readers and cardholders (up to 5,000 readers per server, and up to 60 satellite application servers).
High Availability: The architecture is designed for business continuity, often supporting multi-version software updates so the corporate system remains operational throughout the process.
Flexible Deployment: It offers flexible deployment options, including on-premise, hybrid, and dedicated single-tenant C•CURE Cloud for lower maintenance and high security.
Comprehensive Access and Personnel Control
Advanced Policies: It enables sophisticated security policies like Global Anti-Passback, Occupancy Management, and Area Control to enforce strict access rules in sensitive areas.
Simplified Management Workflows: Features like C•CURE Access Management Workflow simplify the process of requesting and approving cardholder access, reducing the workload on security staff and minimizing human error.
Superior Credential Management: It provides robust solutions for managing credentials and privileges across a wide range of use cases.
Ease of Use and Accessibility
Multiple Access Points: Users can manage and monitor the system from anywhere using the full desktop client, the C•CURE Web client (via any web browser), and the C•CURE Go mobile app.
Intuitive Interface: The user interfaces are designed to be intuitive and sleek, allowing operators to quickly locate meaningful data, manage events, and view critical information on Dynamic Views and Editable Maps.
Visitor Management: The native C•CURE 9000 Visitor Management functionality streamlines the registration and check-in process for visitors, enhancing administrative efficiency and security compliance.