CCURE 9000 Manual: A Comprehensive Overview (Updated 03/04/2026)
Today’s date is 03/04/2026 16:51:20. This manual details the C.CURE 9000 access control system‚ covering architecture‚ components‚ software‚ integration‚ and hardware specifications.
The CCURE 9000 system represents a sophisticated and widely-adopted access control solution‚ designed for robust security management across diverse environments. This system seamlessly integrates hardware and software components to deliver comprehensive control over physical access points. At its core‚ CCURE 9000 utilizes a server infrastructure running Windows 2016 and SQL Server‚ communicating securely via TCP/IP with AES 256-bit encryption.
This manual serves as a detailed guide to understanding‚ installing‚ configuring‚ and maintaining the CCURE 9000 system. It caters to both novice and experienced security professionals‚ providing step-by-step instructions and in-depth explanations of key features. From initial software installation and SQL Server permissions to advanced integrations like Active Directory and biometric enrollment‚ this resource covers all essential aspects of system operation. Furthermore‚ it details hardware specifics‚ including iSTAR Ultra G2 support and material specifications for components like flat flex conveyor belts.

What is CCURE 9000?
CCURE 9000 is a powerful‚ integrated access control and security management system developed by Software House. It’s designed to protect people‚ property‚ and assets by controlling and monitoring access to facilities. The system goes beyond simple door access‚ offering features like alarm management‚ video integration‚ and reporting capabilities.
CCURE 9000’s architecture centers around a central server‚ facilitating communication with various hardware components like reader panels and controllers (including the iSTAR Ultra G2‚ supported from v2.70 onwards in Ultra mode). It supports integration with identity platforms‚ enabling synchronization with Active Directory for streamlined user management. Advanced features include fingerprint and face enrollment‚ alongside compatibility with systems like Keyscan Aurora‚ expanding processing power. The system prioritizes security through robust data encryption standards‚ utilizing AES 256-bit encryption for secure communication.
System Architecture
The CCURE 9000 system architecture is fundamentally client-server based. A central server‚ running Windows 2016 and SQL Server‚ forms the core‚ managing all access control functions and data. This server communicates with field devices – controllers like the General Controller Module (GCM) and reader panels – utilizing the TCP/IP protocol.

Security is paramount‚ with all communication secured by AES 256-bit encryption. Client workstations connect to the server to provide a user interface for system administration‚ monitoring‚ and reporting. The iSTAR Ultra G2 controllers integrate seamlessly‚ particularly in Ultra mode (v2.70 and later). This architecture allows for scalability‚ supporting a large number of doors and users. Integration with external systems‚ such as Active Directory and video management systems‚ further enhances its capabilities‚ creating a comprehensive security ecosystem.
Server Requirements (Windows 2016 & SQL Server)
CCURE 9000 demands a robust server environment. The operating system must be Windows 2016‚ ensuring compatibility and stability. SQL Server is the required database management system‚ responsible for storing all system data – user credentials‚ access levels‚ event logs‚ and more. Specific SQL Server editions may be supported; consult the official documentation for details.
Crucially‚ appropriate SQL Server permissions are needed for two distinct Windows user accounts: one for the initial installation process and another for the ongoing runtime operation of the software. These permissions dictate what actions each account can perform within the database. Proper configuration is vital for system functionality and security. Insufficient permissions will prevent successful installation or operation. Ensure the server meets minimum hardware specifications for optimal performance.
Communication Protocols (TCP/IP‚ AES 256-bit Encryption)
CCURE 9000 relies on TCP/IP as its primary communication protocol‚ enabling data exchange between the server‚ client workstations‚ and field hardware. This standard protocol ensures reliable network connectivity. However‚ security is paramount‚ and therefore‚ all communication is fortified with AES 256-bit encryption. This robust encryption standard safeguards sensitive data transmitted across the network‚ preventing unauthorized access and maintaining system integrity.
The implementation of AES 256-bit encryption protects user credentials‚ access logs‚ and real-time event data. This level of security is crucial for compliance with industry regulations and protecting against potential cyber threats. Proper network configuration is essential to ensure seamless communication while maintaining the highest security standards. Regular security audits are recommended to verify the effectiveness of the encryption protocols.

CCURE 9000 Components & Hardware
CCURE 9000 utilizes iSTAR Ultra G2 (v2.70+ for Ultra mode)‚ General Controller Modules (GCM)‚ and integrates with various reader panels for comprehensive access control.
iSTAR Ultra G2 Support
The iSTAR Ultra G2 is a key component within the CCURE 9000 system‚ offering enhanced access control capabilities. Specifically‚ support for the iSTAR Ultra G2 is available starting with CCURE 9000 version 2.70 and all subsequent releases. However‚ it’s crucial to note that this support is exclusively for operation in “Ultra mode”.
Ultra mode unlocks the full potential of the iSTAR Ultra G2‚ providing advanced features and improved performance. When integrating the iSTAR Ultra G2‚ ensure the firmware is compatible and that the CCURE 9000 software is updated to at least version 2.70. Proper configuration within the CCURE 9000 software is essential to leverage the iSTAR Ultra G2’s functionalities effectively. Refer to the iSTAR Ultra G2 documentation for detailed hardware specifications and installation guidelines.
Ultra Mode Compatibility (v2.70 and later)
Compatibility with Ultra mode functionality for the iSTAR Ultra G2 is a significant feature introduced in CCURE 9000 version 2.70. Prior to this version‚ full integration and access to all iSTAR Ultra G2 capabilities were limited. Upgrading to v2.70 or a later release is therefore essential to unlock the device’s advanced features.

Ultra mode enhances performance and provides access to a broader range of functionalities within the access control system. This includes improved processing power and expanded capabilities for Kaba EAC access control units. Ensure that both the CCURE 9000 software and the iSTAR Ultra G2 firmware are updated to their latest compatible versions for optimal performance and stability. Detailed configuration instructions for Ultra mode can be found in the CCURE 9000 software documentation.
General Controller Module (GCM)
The General Controller Module (GCM) serves as a crucial component within the CCURE 9000 system architecture‚ functioning as the central processing unit for access control decisions at the door level. It manages communication between readers‚ locks‚ and the central server‚ ensuring secure and reliable operation.
GCMs are responsible for executing programmed logic‚ verifying credentials‚ and granting or denying access based on predefined rules and schedules. They operate independently‚ even during network disruptions‚ providing a robust and resilient security solution. Proper configuration of the GCM‚ including network settings and communication protocols‚ is vital for seamless integration with the overall CCURE 9000 system. Detailed information regarding GCM installation‚ configuration‚ and troubleshooting can be found within the system’s comprehensive documentation.
Reader Panels and Integration
CCURE 9000 supports a wide array of reader panels‚ facilitating flexible integration with various access control technologies. These panels serve as the interface between card readers‚ biometric scanners‚ and the GCM‚ transmitting credential data for verification. Successful integration relies on proper wiring‚ configuration within the CCURE 9000 software‚ and adherence to manufacturer specifications.
The system’s architecture allows for seamless connection to diverse reader types‚ including proximity‚ smart card‚ and keypad readers. Compatibility extends to integration with specialized systems like Keyscan Aurora‚ enhancing processing power and capabilities for Kaba EAC access control units. Careful consideration should be given to reader placement‚ ensuring optimal read range and security. Detailed guidance on reader panel installation‚ configuration‚ and troubleshooting is available in the system documentation.

Software & Configuration
CCURE 9000 software installation requires specific SQL Server permissions and user account requirements for both installation and runtime operations‚ as detailed below.
CCURE 9000 Software Installation
The CCURE 9000 software installation process is critical for establishing a secure and functional access control system. It necessitates a server environment running Windows 2016 and a compatible version of SQL Server. Before initiating the installation‚ ensure the server meets the specified hardware and software prerequisites. Two distinct Windows user accounts are essential: one for performing the installation itself‚ and another dedicated to running the Software House application post-installation.
These accounts require specific permissions within the SQL Server databases to facilitate seamless operation. Proper configuration of these permissions is paramount to avoid operational errors and maintain system integrity. Following a successful installation‚ thorough testing is recommended to verify all components are functioning as expected and communicating effectively. Refer to the detailed installation guide for step-by-step instructions and troubleshooting tips.
SQL Server Permissions
Maintaining robust security within the CCURE 9000 system relies heavily on correctly configured SQL Server permissions. Only two Windows user accounts require access to the SQL Server databases: the account utilized during the initial software installation and a separate account designated for the runtime operation of the Software House application. These accounts must be granted specific‚ limited privileges to ensure data integrity and prevent unauthorized access.
Avoid granting excessive permissions‚ adhering to the principle of least privilege. Necessary permissions typically include read‚ write‚ and execute rights to relevant database objects. Detailed documentation outlining the precise permissions required for each account is available within the CCURE 9000 installation guide. Regularly review and audit these permissions to maintain a secure operational environment.
User Account Requirements (Installation & Runtime)
The CCURE 9000 system operation necessitates the creation and management of specific user accounts within the Windows environment. Two distinct accounts are crucial: one for the initial software installation process and another dedicated to the ongoing runtime execution of the Software House application. These accounts should adhere to strong password policies and be uniquely identified for security tracking.
The installation account requires elevated privileges to successfully deploy the CCURE 9000 software and configure the SQL Server database connection. The runtime account‚ conversely‚ needs permissions limited to accessing and operating the application‚ avoiding administrative rights. Proper account segregation minimizes potential security vulnerabilities and ensures system stability. Regularly review account activity and enforce multi-factor authentication where possible.
Adding or Removing Buttons in the Navigation Pane
Customizing the CCURE 9000 interface allows users to tailor the navigation pane to their specific workflows. To modify the displayed buttons‚ begin by locating the configure icon situated within the Navigation tray at the bottom of the Navigation pane itself. Clicking this icon reveals a pop-up menu offering options for personalization.
Select “Add or Remove Buttons” from the menu to access a comprehensive list of available functions. Users can then selectively add frequently used features for quick access or remove those rarely utilized‚ streamlining the interface. This process doesn’t affect core system functionality‚ only the visual presentation and ease of navigation. Remember to save changes after making adjustments to ensure the new configuration is applied.

Integration & Advanced Features
CCURE 9000 offers Active Directory integration‚ identity platform synchronization‚ fingerprint/face enrollment‚ and seamless Keyscan Aurora integration for expanded access control capabilities.
Active Directory Integration
C.CURE 9000’s Active Directory integration streamlines user management by synchronizing with existing directory services. This eliminates the need for duplicate user entries and simplifies administration‚ enhancing security and efficiency. The system seamlessly connects‚ allowing for centralized control of user access rights and permissions.
Synchronization between CCURE 9000 and Active Directory provides a unified platform for managing identities. This integration supports features like automated user provisioning and de-provisioning‚ ensuring that access privileges are current and aligned with organizational roles. It also facilitates password synchronization‚ improving user convenience and reducing help desk requests.
Furthermore‚ the integration offers enhanced reporting capabilities‚ providing a comprehensive audit trail of user access activities. This feature is crucial for compliance and security investigations. By leveraging Active Directory‚ CCURE 9000 delivers a robust and scalable access control solution tailored to enterprise environments.
Identity Platform Synchronization
CCURE 9000’s Identity Platform synchronization offers a powerful method for consolidating user data and streamlining access control. This feature allows the system to connect with various identity providers‚ creating a centralized hub for managing user identities and permissions. Synchronization ensures consistent user information across all integrated platforms‚ reducing administrative overhead and improving security.
The platform supports automated user provisioning and de-provisioning‚ automatically updating access rights based on changes in the identity provider. This minimizes the risk of unauthorized access and ensures compliance with security policies. Furthermore‚ it enables single sign-on (SSO) capabilities‚ providing users with a seamless and convenient access experience.
By integrating with an identity platform‚ CCURE 9000 enhances its scalability and flexibility‚ adapting to evolving organizational needs. This synchronization also facilitates advanced reporting and auditing‚ providing valuable insights into user activity and access patterns.
Fingerprint & Face Enrollment
CCURE 9000 offers advanced biometric authentication through fingerprint and facial recognition enrollment capabilities. This feature enhances security by adding an extra layer of verification beyond traditional access methods like cards or PINs. The system supports a streamlined enrollment process‚ allowing administrators to easily capture and store biometric data for authorized users.
Fingerprint enrollment involves capturing unique fingerprint patterns‚ while face enrollment utilizes advanced algorithms to map facial features. Both methods provide highly accurate and reliable identification. The system ensures data security through encryption and secure storage of biometric templates.
Integration with the identity platform allows for synchronized biometric data‚ ensuring consistency across all access points. This functionality provides a convenient and secure access experience for users‚ while simultaneously bolstering the overall security posture of the facility. Flexible enrollment options cater to diverse organizational requirements.
Keyscan Aurora Integration
CCURE 9000 seamlessly integrates with Keyscan Aurora‚ an advanced access control software solution. This integration expands processing power and capabilities for Kaba EAC access control units‚ providing a robust and scalable security infrastructure. By connecting these systems‚ users benefit from enhanced functionality and improved control over access permissions.
The integration allows for centralized management of access control events and alarms‚ streamlining security operations. Administrators can leverage the combined features of both platforms to create a more comprehensive and efficient security system. This synergy optimizes performance and reduces the complexity of managing multiple security layers.
Keyscan Aurora’s expanded capabilities complement CCURE 9000’s core features‚ offering advanced reporting‚ real-time monitoring‚ and customizable access rules. This integration provides a powerful solution for organizations seeking a sophisticated and reliable access control system.

Hardware Specifics & Materials
Flat Flex Conveyor Belts‚ utilizing carbon steel or stainless steel‚ are available. Stainless steel mesh belts offer top hardness‚ food-grade features‚ and specialized mold pressing.
Flat Flex Conveyor Belt (Related Material ⎼ Stainless Steel Mesh)
The stainless steel flat flex mesh belt is engineered for durability and precision‚ created through a specialized mold pressing process. This construction yields belts of top hardness‚ suitable for demanding applications. The edges of these belts can be effectively driven by chains‚ enhancing their versatility and power transmission capabilities.
These belts are particularly well-suited for industries requiring stringent hygiene standards‚ as they are manufactured with food-grade materials. The stainless steel composition resists corrosion and facilitates easy cleaning‚ ensuring product safety and compliance. Variations in wire diameter are available to accommodate diverse load requirements and operational parameters.
Furthermore‚ the related material‚ stainless steel mesh‚ contributes to the belt’s overall strength and flexibility‚ making it a reliable component within various systems. Its robust design ensures longevity and consistent performance.
Material Specifications (Carbon Steel / Stainless Steel)
Flat Flex Conveyor Belts are available in two primary material options: carbon steel and stainless steel‚ each offering distinct advantages based on application needs. Carbon steel provides high tensile strength and is cost-effective for general-purpose conveying tasks. However‚ it’s susceptible to corrosion in harsh environments.
Stainless steel‚ conversely‚ offers superior corrosion resistance‚ making it ideal for food processing‚ pharmaceutical‚ and chemical industries where hygiene and durability are paramount. The material feature of being “food grade” ensures compliance with strict safety regulations.
Wire diameter specifications are crucial for determining belt load capacity and flexibility. Different diameters cater to varying weight requirements and operational conditions. Selecting the appropriate material and wire diameter is essential for optimal performance and longevity of the conveyor system.
Material Feature (Food Grade)
The “Food Grade” designation for specific Flat Flex Conveyor Belt materials is critically important in industries demanding the highest hygiene standards. This feature signifies that the stainless steel used in construction meets stringent regulatory requirements for direct contact with food products.
These regulations‚ often dictated by agencies like the FDA‚ ensure the material doesn’t leach harmful substances into the food stream‚ preventing contamination and safeguarding public health. The belts are manufactured using processes that minimize the risk of bacterial adhesion and are easily cleanable with approved sanitizing agents.
This food-grade quality extends beyond the steel itself‚ encompassing the construction methods and any coatings applied. It’s a vital specification for bakeries‚ confectionery‚ meat processing‚ and other food-related applications where safety and purity are non-negotiable.

Wire Diameter Specifications
Precise wire diameter is a fundamental specification for Flat Flex Conveyor Belts‚ directly impacting belt strength‚ flexibility‚ and overall performance. The standard wire diameter is 1.0mm‚ though variations exist to suit specific application needs. Thicker wires provide increased load-bearing capacity and durability‚ ideal for heavier products or demanding environments.
Conversely‚ thinner wires offer greater flexibility‚ beneficial for navigating tight corners or handling delicate items. The chosen diameter influences the belt’s open area‚ affecting airflow and drainage capabilities. Accurate wire diameter control during manufacturing is crucial for maintaining consistent belt quality and preventing premature failure.
Selecting the appropriate wire diameter requires careful consideration of the conveyed product’s weight‚ shape‚ and the operational conditions of the conveyor system. Proper specification ensures optimal belt longevity and efficiency.

Security & Certifications
The CCURE 9000 system utilizes data encryption standards‚ including AES 256-bit encryption‚ and possesses relevant security certifications for robust access control.
Security Certifications
The CCURE 9000 system’s security posture is reinforced by adherence to industry-recognized certifications‚ ensuring a robust and reliable access control solution. While specific certification details aren’t explicitly provided in the source material‚ the system’s implementation of AES 256-bit encryption signifies a commitment to high-level data protection standards.
This encryption protocol is a Federal Information Processing Standard (FIPS) approved algorithm‚ widely trusted for safeguarding sensitive information. Further certifications likely relate to physical security standards and compliance with data privacy regulations‚ depending on the deployment environment.
These certifications demonstrate Software House’s dedication to providing a secure platform for managing access control‚ protecting assets‚ and maintaining operational integrity. Ongoing compliance and regular security audits are crucial components of the CCURE 9000’s security framework.
Data Encryption Standards
The CCURE 9000 system prioritizes data security through the implementation of robust encryption standards. Specifically‚ the system utilizes TCP/IP communication secured with AES 256-bit encryption. This Advanced Encryption Standard (AES) is a symmetric-key algorithm‚ meaning the same key is used for both encryption and decryption‚ offering a high level of security.
The 256-bit key length provides a substantial level of cryptographic strength‚ making it extremely difficult for unauthorized parties to decipher intercepted data. This encryption applies to communication between the server‚ client workstations‚ and connected hardware components like controllers and readers.
Employing AES 256-bit encryption ensures the confidentiality and integrity of sensitive information‚ including access credentials‚ event logs‚ and system configurations‚ protecting against potential cyber threats and unauthorized access.