Global Directory

  • HVAC EQUIPMENT
    • Johnson ControlsJCI logo
    • YorkYORK logo
    • HitachiHitachi
    • LuxaireLuxaire Heating & Cooling logo
    • Championchampion
    • QuantechQuantech logo
    • ColemanColeman logo
    • EnvirotecEnviro-Tec logo
    • TempmasterTempMaster logo
    • AirMateAir Mate Logo
    • AMPCOAnsul logo
    • TrionTrion IAQ logo
    • TriatekTriatek logo
  • Security
    • American DynamicsTyco American Dynamics logo
    • Bentel SecurityTyco Bentel Security logo
    • CEM SystemsTyco CEM Systems logo
    • CloudTyco Cloud logo
    • ExacqTyco Exacq logo
    • IllustraTyco Illustra logo
    • KantechTyco Kantech logo
    • Software HouseTyco Software House logo
  • Digital Solutions
    • Johnson ControlsJCI logo
  • Industrial Refrigeration
    • YorkYORK logo
    • SabroeSabroe logo
    • FrickFrick Industrial Refrigeration logo
  • Residential and Smart Home
    • Johnson ControlsJCI logo
    • GlasGLAS written on a white background
    • LUXLUX logo
  • Fire Suppression
    • Tyco FireTyco Blue Logo
    • SABOFOAMSabi Foam logo
    • AnsulAnsul logo
    • HygoodHygood logo
    • ChemguardChemguard logo
    • GrinnellGrinell logo
    • SkumSkum logo
    • SprinkCADSprinkCAD logo
    • rapidresponseRapid Response logo
    • Pyro ChemPyro-Chem logo
    • WILLIAMSWilliams Fire & Hazard Control logo
  • Retail Solutions
  • BUILDING AUTOMATION AND CONTROLS
    • Johnson ControlsJCI logo
    • MetasysMetasys logo
    • PENNPenn logo
    • Facility ExplorerFacility Explorer logo
    • VerasysVerasys logo
    • BCPROAnsul logo
  • FIRE DETECTION
    • AutocallAnsul logo
    • FireClassFireClass logo
    • SimplexSimplex logo
    • VigilantVigilant logo
    • ZettlerZettler logo
    • DBEDBE written on a white background
  • DISTRIBUTED ENERGY STORAGE
    • Johnson ControlsJCI logo
  • BATTERIES
    • DelkorDelkor written on a white background
    • HeliarBaterias Heliar logo
    • OPTIMA BATTERIESOptima Batteries logo
    • LTHLTH logo
    • VARTAVarta logo
    • MACMAC logo
JohnsonControls logo
Login | Register
Login | Register
Software House
  • Products & Solutions
    Products & Solutions
    • Access Control Management Software
      Access Control Management Software
      • Access Control Management Software
      • Access Control + Event Management Software
    • Controllers
      Controllers
      • Controllers
      • Door Controllers
      • Door Controller Modules + Accessories
      • Electronic Locks
      • Exit Devices
    • Readers & Credentials
      Readers & Credentials
      • Readers & Credentials
      • Readers and Biometrics
      • Credentials
    • Other Products & Services
      Other Products & Services
      • Other Products & Services
      • Access Control + Event Management
      • Badging Printers Scanners + Accessories
    • Register Software Licensing
  • Services & Support
    Services & Support
    • Services & Support
    • Support Portal
    • Professional Services
    • Register Software Licensing
    • Software Support Agreement
    • C•CURE User Forum
    • C•CURE Go Reader Privacy Notice
    • Cyber Protection Program
    • Training & Support Services
    • Warranty & Repair Services
  • Industries
    Industries
    • Industries
    • Data Centers
    • IT, Telecom and Professional Services
    • Financial and Banking
    • Education
    • Government
    • Transportation
    • Healthcare
    • Retail
    • Industrial and Manufacturing
    • Sports and Entertainment
  • Partners
    Partners
    • Compatibility Matrix
    • Technology Partners
Search Contact Us
  1. Software House
  2. Controllers
  3. Door Controllers
  4. iSTAR Edge G2 Controller
Istar edge G2 board product image
Istar edge G2 product image
Istar edge G2 product image
Istar edge G2 product image
  • Istar edge G2 board thumb image
  • Istar edge G2 thumb image
  • Istar edge G2 thumb image
  • Istar edge G2 thumb image

iSTAR Edge G2 Controller

A powerful, cyber-hardened IP edge access control device

iSTAR Edge G2 is a powerful, cyber-hardened IP edge access control device that provides reliable, localized access control decision making at each door. Its optional PoE module supports up to eight readers.

  • iSTAR Edge G2 is an OSDP-verified, cyber-hardened IP edge access control device, ideally suited to standalone edge applications. It provides reliable stand-alone physical access control for up to eight doors, with local database of up to one million cardholders.
  • The iSTAR Edge G2 8 Reader Door Controller provides the highest security through OSDP. It drastically lowers costs for installation and start up where costly space is limited, and its wet lock outputs eliminate the need for additional power supplies.
  • Built using a Trusted Execution Environment with advanced network security features, the iSTAR Edge G2 controllers support cyber resilience through OSDP Secure Channel, which provides encrypted two-way reader communications.
Back to Top

iSTAR Edge G2 Controller

  • Overview
  • Features
  • Benefits
  • Product literature
  • Related Products
    Contact Us

    Big controller power in a small package

    One of the most powerful, flexible and secure edge access controllers in the market, iSTAR Edge G2 provides effortless upgrades from its predecessor, iSTAR Edge. It offers support for an impressive eight doors per panel, reducing costly real estate requirements for your security installation. iSTAR Edge G2 controllers are OSDP-verified. They support embedded High Assurance FICAM operation without additional third-party hardware, making them ideal solutions for both government and commercial users.
    Big controller power in a small package

    Features

    • Stand-alone physical access control for up to eight doors, enabling localized decision-making at each door
    • An advanced access control feature set, including anti-passback, peer-to-peer clustering and local event logic
    • OSDP-verified, with encrypted, two-way reader secure channel communication
    • Controls and powers all access control devices at the door to minimize installation costs
    • Wet lock outputs to eliminate the need for additional power supplies
    • A stand-alone IP edge access controller with a database of up to one million credentials for localized decision-making
    • A Trusted Execution Environment to provide advanced hardware-based cybersecurity protection
    • A Power over the Ethernet (PoE) module featuring PoE Plus, with enough power for two doors and associated devices
    • An LCD display to provide status and troubleshooting information
    • A simple upgrade path to iSTAR Edge G2 with the iSTAR Edge Conversion Tool

    Benefits

    Saving You More Money
    Saving you more money

    Drastically reduce installation and startup costs while upgrading features with iSTAR Edge G2. It can directly replace its predecessor, iSTAR Edge; the hardware configurations and connection points remain the same, and the same iSTAR enclosure can be used, too.

    An Effortless Upgrade
    An effortless upgrade

    Hardware, firmware and software can be effortlessly upgraded thanks to features based on pre-existing Edge controllers. They include a 1.2GHz dual core CPU, advanced firmware features such as OSDP, clustering, intrusion zones and keypad commands, panel-based event logic, area controls and ample spare memory for future needs.

    So Much Flexibility
    So much flexibility

    iSTAR Edge G2 controllers provide a variety of power sourcing options for two doors. They offer a choice between a 12/24VDC local power source or iSTAR Edge G2’s unique PoE / PoE Plus plug-in module, which provides cost savings and ease of installation.

    Cybersecure At The Core
    Cybersecure at the core

    The advanced, hardware-based cybersecurity protection utilizes the Trusted Execution Environment, a secure, isolated environment within its CPU that runs in parallel to the main Linux OS. This guarantees confidentiality and the integrity of the code and data loaded within the device.

    Scalable And Expandable
    Scalable and expandable

    iSTAR Edge G2 controllers offer expandable inputs and outputs using I8 and R8 modules, with the ability to connect as many as eight of each module per controller.

    Related Products

    iSTAR Edge Controller

    iSTAR Edge Controller

    iSTAR Ultra G2 Controller

    iSTAR Ultra G2 Controller

    iSTAR Ultra Controller

    iSTAR Ultra Controller

    Software House software options

    Software House software options

    Touchscreen Reader

    Touchscreen Reader

    IP-ACM v2 Ethernet Door Module

    IP-ACM v2 Ethernet Door Module

    RM and OSDP Boards

    RM and OSDP Boards

    I/O Modules and Devices

    I/O Modules and Devices

    Software House
    CONNECT WITH US
    • Facebook Icon
    • LinkedIn Logo
    • Twitter logo
    • Youtube Icon
    JCI Logo
    Contact Us Subscribe to our newsletter
    • Access Control
    • Video Management Systems
    • Cameras
    • Commercial Intrusion
    • Residential Intrusion
    • Access Control + Event Management Software
    • Door Controllers
    • Door Controllers Modules + Accessories
    • Electronic Locks
    • Exit Devices
    • Readers and Biometrics
    • Credentials
    • Badging Printers Scanners + Accessories
    • Data Centers
    • IT, Telecom and Professional Services
    • Financial and Banking
    • Education
    • Government
    • Transportation
    • Healthcare
    • Retail
    • Industrial and Manufacturing
    • Sports and Entertainment
    • Support Portal
    • Software Support Agreement
    • C•CURE User Forum
    • Cyber Protection Program
    • Training & Support Services
    • Resources
    © 2025 Johnson Controls. All Rights Reserved.
    • Privacy Notice
    • Terms of Use
    • Accessibility
    • Modern Slavery Act