Access control
  • Products
  • Companies
  • Applications
  • News
  • Global Security Exchange (GSX) 2025
  1. Home
  2. Access control products
  3. Access control software

Access Control Softwares  (654)

Refine by:
Products selected for compare
Compare Clear All
TDSi generic intruder integration module
TDSi generic intruder integration module

TDSi 4420-2501 part of EXgarde PRO access management PC software is a generic integration module.

Add to Compare
TDSi Simons Voss SmartIntego integration module
TDSi Simons Voss SmartIntego integration module

TDSi 4420-2108 is a Simons Voss SmartIntego integration module compatible with Exgarde 4.4.

Add to Compare
TDSi Milestone Integration Module
TDSi Milestone Integration Module

TDSi 4420-2210 is a Milestone integration module.

Add to Compare
CDVI UK AMC25 Mobile-PASS smart device credentials, 25-pack
CDVI UK AMC25 Mobile-PASS smart device credentials, 25-pack

Mobile-PASS for ATRIUM combines simplicity with robust security, allowing authorised users to unlock doors with their smartphone or other smart device. Offering five different methods for triggering the unlock, Mobile-PASS is a convenient Bluetooth-enabled access solution. Mobile-PASS is compatible with the ATRIUM A22K high security controller and K Series of readers (including K2 and K3). Already equipped with end-to-end military grade encryption technology, the system now adds the flexibility of smartphone credentials to its many security benefits. Use your smartphone as an access credential Five different methods for validating entry No annual subscription fees or cloud storage costs For use with A22K controller only Free ATRIUM app available on iOS and Android

Add to Compare
Parabit 200-50000 single-user database configuration software
Parabit 200-50000 single-user database configuration software

Parabit 200-50000 is a single-user database configuration software. It provides an easy to follow user interface for configuration options of the controller and logging capabilities. The configuration of location hours of operations for door locking and unlocking as well as holiday exceptions are clearly laid out. It is designed to be installed on a Windows 2000 or XP-based PC with a minimal foot print to other production applications.

Add to Compare
Gallagher Locker Management Solution
Gallagher Locker Management Solution

Gallagher's fully integrated Locker Management Solution allows a site to manage locker access, automate allocation, and ensure the best utilization of their locker resources all natively from within Command Centre. Flexible allocation times and a dynamic locker viewer combine to make agile locker use a reality for the modern business.

Add to Compare
Rosslare Security Products AS-215
Rosslare Security Products AS-215

The AS-215 is a self-contained Client/Server application that is ideal and economical solution for managing the Veritrax access control system. AS-215 was developed using 32-bit software architecture, with a variety of drivers for communications including TCP/IP, RS-232 and MODEM. It offers a powerful set of features, including intelligent addressing and configuration of all the parameters. The SERVER PC will function as the control and administration centre for the system. While CLIENT PC can be used for remote terminals to configure and control the system on a real time basis.

Add to Compare
Gallagher Application Programming Interfaces
Gallagher Application Programming Interfaces

Gallagher Command Centre server and Controller Application Programming Interfaces (APIs) extend the functionality and flexibility of the Gallagher system as the platform for integration. The Gallagher Controller API is the solution, allowing for events to be sent to and received from third parties such as video, duress, building management, external alarm and fire alarm systems.

Add to Compare
Gallagher Active Directory Cardholder Sync allows cardholder permissions and information to be transferred
Gallagher Active Directory Cardholder Sync allows cardholder permissions and information to be transferred

Gallagher’s bidirectional Microsoft Active Directory Cardholder Sync enables Active Directory user records to be replicated through to Gallagher Command Centre cardholder records. This includes creation, modification and deletion of both user details and access permissions.  Additionally, changes to cardholder details and images within Command Centre can be replicated out to Active Directory or a file share location. Combining the power of both the Cardholder REST API and Cardholder Change Tracking API, the Active Directory Cardholder Sync is packaged in a single installer, and is fully configurable to suit the Active Directory structure of your organization.

Add to Compare
Gallagher Active Directory single sign on allows operators to be automatically logged into Command Centre
Gallagher Active Directory single sign on allows operators to be automatically logged into Command Centre

Simplify and automate operator logon to Command Centre or Visitor Management applications. Command Centre can take advantage of the inherent capabilities of Microsoft® Active Directory password management, such as enforced expiry dates and password complexity for Command Centre logon. Password policies set by the IT department via Active Directory can now be effectively inherited by Command Centre. Command Centre also supports the ability for the system to automatically log an operator in to Command Centre when the application is launched using their Windows logon and password validated at logon via Active Directory.

Add to Compare
Gallagher System division and site plans access control software
Gallagher System division and site plans access control software

With Gallagher Command Centre, the number of workstations or operators is limitless. Operators are subject to system division and are assigned privileges so they can only carry out authorised functions or view content defined for them. A site can be split into divisions and sub-divsions by system division (or partitioning). This is particularly suited to: Multi-tenanted buildings where tenants manage and monitor their own security. Large enterprise-wide systems where it is more practical to divide the site – by geographic zones for example – for ongoing management and monitoring. Site plans are a graphical representation of the site and show the real-time status of remote field devices and logical entities. They display visually rich, configurable elements such as fence lines and buildings with associated alarms and can be used for general site or alarm monitoring and management. Site plans feature touch-screen support and ‘free text’ objects. An unlimited number of site plans can be stored in the system.

Add to Compare
Morse Watchmans TrueTouch client software
Morse Watchmans TrueTouch client software

Morse Watchmans TrueTouch client software comprises the KeyBank TrueTouch client interface and the KeyBank Server for enhanced administration and control of the KeyBank Touch system. It is designed to run all programming, remote functions and reports for up to 10 KeyBank Touch locations.

Add to Compare
Texecom Maintex Software remote maintenance software with database storage for maintenance information
Texecom Maintex Software remote maintenance software with database storage for maintenance information

Remote maintenance software compatible with Premier 48, 88 & 168 control panels. Automates remote maintenance procedure and provides database storage of maintenance information.

Add to Compare
Gallagher Tag Boards improves emergency response time and evacuation management with real-time tracking
Gallagher Tag Boards improves emergency response time and evacuation management with real-time tracking

Actively monitor workers within a zone, on local or remote sites. Ensure blast zones have been cleared before explosives are detonated. Monitor the movement of people to a muster area during an evacuation. Ensure the security control room is aware of workers who are alone on remote sites. Monitor who remains within a high security area at the end of a working day or shift.

Add to Compare
CEM AC2000 T&A - time and attendance software with user friendly interface
CEM AC2000 T&A - time and attendance software with user friendly interface

The AC2000 Time and Attendance module is a reporting method for the office manager/administrator who requires statistics on the in and out movements of staff.   Integrated into the AC2000 system, it provides a very powerful, configurable tool that allows the administrator to run reports on the number of hours worked by staff. Rather than installing a separate timekeeping system, existing pass cards and readers can be used for both access control and time and attendance.  Any number of readers on the system, at any location, can be configured as designated IN and OUT readers for the purposes of Time and Attendance.  As each member of staff presents a card their transactions are populated into the AC2000 database.  

Add to Compare
Verex INOVA Master
Verex INOVA Master

INOVA access control systems ensure that only authorized people have access to facility and only during appropriate time periods. INOVA Master software provides easy administration and activity reporting. INOVA Master software provides a central location from which all required information is distributed to individual doors controllers. The software also retrieves activity data from individual control panels for activity and basic attendance reporting.

Add to Compare
Guardall Inova Master for Win95
Guardall Inova Master for Win95

Access control administration and reporting software suitable for multi-door applications in commercial and industrial applications. Inova Master for Windows features 40 Door Control Capacity ; Multiple Reporting Formats ; Schedule Door Unlock/Lock ; Manual Door Control ; 14 TimeZones for Card Access ; 15 Fully programmable Holiday Blocks ; and Windows 95' Style Graphical User Interface.

Add to Compare
CEM AC2000 Muster Zones application for emergency situation
CEM AC2000 Muster Zones application for emergency situation

CEM AC2000 Muster Zones application is used for emergency situations where card holders must congregate in a dedicated ‘safe’ location. The application can be used both in the evacuation of card holders to a location away from the site (or zone) or when necessary it can be used to enable card holder’s to move to a particular safe location within the premises

Add to Compare
CEM SWFAIL AC2000 failover software license
CEM SWFAIL AC2000 failover software license

CEM SWFAIL is a failover server software licence.

Add to Compare
IDTECK Software Development Kit access control software for software development
IDTECK Software Development Kit access control software for software development

SDK stands for Software Development Kit which is set of library file for software development. Generally, SDK provides library file or API which helps to develop users' own software. The library or API provided by IDTECK are COM or OCX type file and they allow to interface with IDTECK's products. Software developer can develop own software with using Method or API which is opened from OCX.

Add to Compare
LEGIC CSW-2000 access control software
LEGIC CSW-2000 access control software

With the CSW-2000 segments can be defined and credentials can be initialised (e.g. as Master-Token or as user credential).  The configuration required for a project can be easily administrated.  The graphical user interface enables a quick analysis of credentials as well as the configuration of LEGIC advant reader modules.  The CSW-2000 can be operated together with the Configurator Hardware CHW-2000, the Development Kit DK-2000 or a LEGIC advant based reader from a LEGIC partner.

Add to Compare
Gallagher Elevator Interfaces
Gallagher Elevator Interfaces

Gallagher Elevator High Level Interfaces (HLI) allow the Gallagher security system to control access to floors from elevator cars. With a range of high level interfaces, the Gallagher system can be integrated with your new or existing elevator system to provide access control to each individual floor. Destination Based Dispatching HLI enables elevator systems to group passengers travelling to similar destinations for more efficient access control.

Add to Compare
CEM AC2000 AED - alarm and event display
CEM AC2000 AED - alarm and event display

The AC2000 AED (Alarm and Event Display) is the integrated alarm processing software for AC2000 providing dynamic graphical representation of all system events.  The main function of AED is to transmit real-time graphical, audio and textbased information on all alarms and events that occur on the AC2000 system.  Operators can choose how they want to view alarms - graphical maps, text alarms list or both.  AED provides password protected user access to ensure that only operators with the correct privileges may take certain actions.  AED provides the interface between AC2000 and CCTV.     

Add to Compare
Gallagher Intercom Interfaces
Gallagher Intercom Interfaces

The Gallagher Intercom HLI enables digital intercom systems to be integrated into the Gallagher access system. This allows intercom functionality and related intercom alarms and events to be supported through the Gallagher Command Centre graphical user interface by Gallagher operators. Multiple intercom systems can be supported in the Gallagher system. For each intercom system, individual intercom units are uniquely identified. The Gallagher system becomes the user interface to control calls for the intercom system. The audio communications remain within the originating intercom system.

Add to Compare
CEM SYS/102/00F CDC failover server
CEM SYS/102/00F CDC failover server

CEM SYS/102/00F is a CDC failover server which provides the highest level of system resilience.

Add to Compare
CEM AC2000 VIPPS with high speed processing and data storage
CEM AC2000 VIPPS with high speed processing and data storage

The AC2000 VIPPS system provides a photo imaging application that is fully and seamlessly integrated with the AC2000 access control software.  VIPPS gives the operator a range of video imaging facilities for capturing personnel images, company logos and personnel signatures and incorporating these onto professionally designed passes.  VIPPS allows users to design professional quality permanent and temporary ID passes which can include text, logos, multiple colours, graphics, photos, barcodes and signatures.  

Add to Compare
ControlSoft KeyMaster Lite 3.0
ControlSoft KeyMaster Lite 3.0

KeyMaster Lite communicates with AC-3114 system controllers via direct serial port connections or dial-up modems. Using an Ethernet/RS-232 hardware bridge or software gateway, you can also set up communication with controllers via a corporate LAN or the Internet.

Add to Compare
Parabit SaaS Access Control Software Suite
Parabit SaaS Access Control Software Suite

Reduces IT certification requirements/costs  Cellular/Ethernet communication option removes hardware installed on your network  Eliminates one-time and annual costs of maintaining servers, network and database admins  Supports rapid deployment of software and firmware updates  AES 256 Encrypted Communication complies with Federal Banking Regulation requirements on data storage and communication

Add to Compare
Keyscan AUR-CCTV generic video integration license
Keyscan AUR-CCTV generic video integration license

AUR-CCTV is a generic video integration license

Add to Compare
CEM AC2000 SIA Intruder Interface compatible with multiple intruder detection systems
CEM AC2000 SIA Intruder Interface compatible with multiple intruder detection systems

The SIA Intruder Interface with AC2000 SE enables alarms from intruder detection systems to be displayed using a single alarm display screen.  Intruder detection panels are added to AC2000 SE as separate devices with alarms generated by the panels forwarded to AC2000 SE over an Ethernet network using the SIA protocol. Each panel is added to the system in groups of 8 or 16 inputs using a user friendly application which simplifies the configuration of larger intruder panel systems by automatically creating and addressing entries in the AC2000 devices table thereby greatly reducing the amount of data the operator must enter.     

Add to Compare
Keyscan AUR-AI active directory integration license
Keyscan AUR-AI active directory integration license

AUR-AI is an active directory integration license

Add to Compare
Esser MultiAccess
Esser MultiAccess

MultiAccess for Windows V6 is software package for configuring and controlling an Access control system using the ACS-1, ACS-2 and ACS-8 controllers. The inherent flexibility of this system can easily expand the system as the access control demands. When you need to increase the capacity of the system you do this by purchasing software extensions as required. The networking options with the system mean you can have a dedicated network for the Access control system using either RS485 or Ethernet or you can utilise the existing building Ethernet infrastructure to connect the Access control units together.

Add to Compare
CEM AC2000 Vehicles - ntegrated vehicle management module
CEM AC2000 Vehicles - ntegrated vehicle management module

The AC2000 Vehicles integrated vehicle management module allows users to produce a professional pass or vehicle tag for all vehicles which require access to secure areas, with the ability to associate cardholders to vehicle records. The AC2000 Vehicles module is used to store details of vehicles on the AC2000 system such as vehicle make, model and registration number. 

Add to Compare
PAC 21729/50.10
PAC 21729/50.10

PAC for Windows on CD 16 Door System Software. 16 doors can be controlled. For use with PAC integrated access control and alarm monitoring systems.

Add to Compare
Apollo Security Sales APACS
Apollo Security Sales APACS

Graphic maps allow monitoring and control, extensive event reports, card holder management and badge design. Other features include interbase or MS SQL database management system, single or mult-user applications, 256 work stations, unrestricted number of controllers, readers and alarm panels, modular structure, multicard formats, 255 access levels, elevator control, duress and database conversion.

Add to Compare
Visonic PROXSOFT
Visonic PROXSOFT

Software for control of proximity access control system directly from PC. The proxsoft event table logs system events and displays event-related information.

Add to Compare
Keyscan AUR-DMP intrusion panel integration license
Keyscan AUR-DMP intrusion panel integration license

Keyscan AUR-DMP is an intrusion panel integration license

Add to Compare
PAC 13028
PAC 13028

Second site module, allows for the addition of a second site to any PAC for Windows system. The site may be connected via a central network controller, a PC interface kit or as a connection directly from the PC to a PAC 2100/1100 master door controller.

Add to Compare
CEM AC2000 DVR Interface
CEM AC2000 DVR Interface

The AC2000 DVR suite of applications provides the ability to associate access control alarms with digital video clips. The DVR Configuration Module seamlessly integrates AC2000SE with Digital Video Management Systems (DVMS) giving the operator a range of video imaging facilities to generate alarm reports with associated video, view live video feed, control camera positioning, control image quality and capture images to file.   

Add to Compare
Parabit SKIMGARD Skimming Detection Technology
Parabit SKIMGARD Skimming Detection Technology

SkimGard® technology is engineered to constantly monitor a defined area in front of the reader surface. The reader faceplate contains raised sections which provide for a mechanically difficult area to install a skimming device. When an object is placed over the card slot (for a pre programmed time interval), an input will be activated on an existing alarm system

Add to Compare
  • «
  • 1
  • 2
  • ...
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • »
Featured white papers
Access and security in the age of hybrid working

Access and security in the age of hybrid working

Download
Cybersecurity in keyless access management

Cybersecurity in keyless access management

Download
The critical role of access control in K-12 school security

The critical role of access control in K-12 school security

Download

Milestone cloud deployment guide

Make the cloud your competitive edge!

Get it now!

Sections Products Companies Applications News About Contact Terms and Conditions Privacy Policy
SourceSecurity.com Security Products Security Companies Security Events Security News Markets Security Applications Videos CCTV Systems CCTV Cameras CCTV DVRs Dome Cameras IP Cameras CCTV Lenses CCTV Software Access Control Systems Intruder Alarms Intruder Detectors Biometrics
SecurityInformed.com Barcode Readers Biometric Readers Access Control Controller Magnetic Stripe Card Security Product Manufacturers Security Product Distributors Security Installers Security Consultants Security Systems Integrator Security cameras Global Security Exchange (GSX) 2025

DMA

Copyright © Notting Hill Media Limited 2009 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com | MaritimeInformed.com | ElectricalsInformed.com

Updated Privacy and Cookie Policy
We have updated our Privacy Policy for GDPR.
We also use cookies to improve your online experience, Cookie Policy