Suprema Access Control Readers(72)
Suprema launches Xpass access controller, an IP based RF reader/controller. Packed in a sleek and compact black body, the Xpass features PoE (Power over Ethernet), waterproof, network interfaces and built-in controller functions bring significant cost savings in installation & maintenance by leveraging existing network. Xpass provides easy installation and network connectivity by TCP/IP (or RS485) interface, Wiegand as well as an internal relay for direct lock interface. By adopting PoE, the Xpass completes true IP-to-the-door access control which means only single CAT5/6 cable is required for both network and power.The design of Xpass is focused on satisfying both aesthetic and practical aspects. It features rounded edges and straight lines with silver finish with the body covered in black. Weighing less than 160 grams, its extra slim 45mm width make Xpass to easily fit in most of door frames. Xpass also features IP65 certified water and dust protection which make it ideal for outdoor installation, and also offers greater durability in indoors than ordinary access controllers.See the key features of the Xpass access control reader In addition, Xpass is fully compatible with the BioStar, SUPREMA's IP based distributed access control management system. "The Xpass is the latest addition to our growing access control lineup and provides extra flexibility for our customers in designing their access control system with or without biometric solutions. With no compromise in level of security and performance, we will continue to execute our strategy of meeting the needs from the diverse and growing security market," said Brian Song, CTO at Suprema.Suprema is increasingly focusing on developing "IP enabled distributed access control system" to answer trends and needs from the security industry. Along with its biometric access control system, the Xpass will set Suprema as a leader in access control, especially for fast-growing IP based security system market.Add to Compare
The new FaceStation is a dedicated face recognition terminal which provides a perfect combination of convenience and high security. Optimizing Suprema’s renowned biometric technology combined with state-of-the-art hardware, FaceStation allows fast and accurate access control security like no other product in the market. FaceStation comes with a wide array of features & functions, which can be accessed through an intuitive touch screen GUI. The device also features embedded web server for easier device control, and supports both analogue and digital video phone integration. FaceStation from Suprema features: Next generation face recognition technology High performance face recognition by Suprema’s proprietary algorithm Unparalleled image processing performance using both visual camera and IR camera Intelligent adaptive/active LED illumination for increased accuracy Powerful dual-CPU architecture GHz DSP dedicated to face recognition 667MHz RISC for device operation 4.3" Touchscreen LCD & intuitive GUI Ultra wide 4.3” WVGA touch screen LCD Solid and scratch-free surface for extra durability Fully customizable, intuitive and user friendly GUI Distributed IP access control system Provides reader and controller features in one device TCP/IP, WiFi and PoE(Power over Ethernet) Video phone interface Provides built-in camera, microphone and speaker Supports both IP based video phones and analog video phones BioStar VideoPhone software to support single/multi operator interphone systems Versatile interfaces - extra flexibility Provides 2-channel RS485, RS232, Wiegand and USB Provides 4 inputs and 2 output relays Optional I/O ports for further expansion (Secure I/O)Add to Compare
Suprema, Inc., a leading global provider of technology in biometrics and security, recently announced the launch of a new model of IP access control multi-smartcard reader and controller, ‘Xpass S2’. Compared to its predecessor Xpass Slim, Xpass S2 is remarkably enhanced in RF performance as it now supports reading of various more card technology standards including MiFare, DESFire, ISO14443A/B, ISO15693 and FeliCa, as well as NFC. It also reads and writes data on the card sectors. In addition, with IP65 ingress protection rating, Xpass S2 is equipped with built-in adaptive heater and works under a harsh environment at a wide operational temperate range of -35°C to 65°C. It also supports expanded capacity, up to 50,000 user badges and 100,000 event logs for enterprise level organisations as well as small and medium sized businesses. Xpass S2 comes not only with TCP/IP interface, but also more traditional interfaces such as RS485 and Wiegand to provide higher flexibility and multiple installation options for different environments. A built-in relay and a configurable Wiegand interface enable Xpass S2 to be used as a standalone controller with other 3rd party readers. The device is designed by focusing on satisfying both aesthetic and practical aspects, featuring multi-colour LED indicator and extra slim profile of 11.4 mm. Measuring 80 mm of height and 120 mm of width, it perfectly fits switchboxes for most US, EU and APAC countries to provide easier installation. “The Xpass S2 is the latest addition to our growing access control lineup and provides extra flexibility for our customers in designing their access control systems with or without biometric solutions,” said Young S. Moon, Vice President of Suprema Inc. “Along with our biometric access control system, the Xpass S2 is expected to set Suprema as a leader in IP access control, meeting various needs for flexibility, complexity and scalability”Add to Compare
Suprema, Inc., a leading global provider of technology in biometrics and security, recently launched a new version next generation BioEntry W access control terminal, which is embedded with HID Global’s iCLASS SE smart card technologies. In conjunction with the expansion of its RF technology, the enhanced BioEntry W was upgraded with HID iCLASS SE as well as enhancements for FeliCa IC cards which are most widely used in Japan and the region. BioEntry W exquisitely blends benefits of IP access control system with high-level security provided by fingerprint biometrics. Featuring a vandal-resistance and IP65 rated structure, BioEntry W is ideally designed for outdoor installation while offering exceptional durability in harsh environments. With its extensive communication interfaces and PoE (Power over Ethernet) capability, it is the ultimate outdoor fingerprint terminals for access control systems in the global market. With this enhanced version BioEntry W and its robust market presence serving as momentum, Suprema plans to reinforce and expand its business and marketing strategies globally. “Like the new BioEntry W, integration with a global leader like HID is significantly meaningful for biometrics and security markets’ advancement as well as for growth of Suprema.” said Young S. Moon, vice president of Suprema. “Such partnership for integration is essential in establishing milestones from the view of ceaseless provision of state-of-the art technology and products bringing higher value-added benefits to customers and end users.”Add to Compare
Along with the launch of new web based open security platform BioStar 2, Suprema has released BioStation 2 to set a new standard in biometric access control and time & attendance. The terminal embeds an all new optical sensor, powerful hardware, and a new exterior to enable ultra-performance in any environment. Combined with the latest innovative features from Suprema, the device offers unmatched benefits to customers looking for a biometric access control and time & attendance solution. Superior biometrics under any conditions The new optical sensor can scan and produce clear and accurate fingerprint images in any condition leveraging the new sensor architecture and innovative features. Conditions that may affect fingerprint capture range from wet or dry fingers to external light getting into the sensor. The new sensor incorporates the Adaptive Gain Control feature along with a new sensor architecture for optimal results. The new exterior of the BioStation 2 is exquisite and crafted with an eye for the detail and will act as a centrepiece to wherever it is installed. The device features full touch capacitive buttons for easy navigation, and the already intuitive UI is further supported with Voice Feedback. An IP65 rating will protect the device from environmental elements such as dust and rain and ensure the device will function in outdoor installations as well as indoors. Ultra-performance and compatibility The hardware features a powerful processor and revised memory handling processes. The device provides Instant Matching through which it can match and authenticate fingerprints 3 times faster than previous generation devices. BioStation 2 also provides maximum user capacity of 500,000 with staggering 3,000,000 logs. Furthermore, the large user database associated with the biometric system can now be transferred 30 times faster between server and device using Rapid Data Transfer technology incorporated into BioStar 2 and BioStation 2. The terminal also supports extensive line-up of smart card technology with support for 125KHz EM and HID Prox, and 13.56MHz MiFare/DesFire/DesFire EV1/Felica/NFC and HID iClass SE. Along with the built-in Wi-Fi and PoE (Power-over-Ethernet) give flexible installation options for the device.Add to Compare
Browse Access Control Readers
- Keypad Integrated
- Long Range
Access control reader products updated recently
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be highly functional, flexible, and convenient for organisations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The role of the cloud The cloud has proven to be a highly functional, flexible, and convenient method for organisations to leverage as part of their strategies to protect and modernise their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalising on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Suprema ID, a global provider of biometrics and ID solutions, announced that the company's BioMini Slim 3, the world's slimmest FAP30 optical fingerprint authentication scanner, received FBI PIV (Personal Identity Verification) and Mobile ID FAP30 certification, tested under the FBI's Next Generation Identification (NGI) Image Quality Specifications (IQS). BioMini Slim 3 features an array of cutting-edge technologies including 15mm ultra-slim FAP30 optical sensor with wider platen, Suprema ID's proprietary Multi-dynamic Range (MDR) technology and IP65-rated dust and waterproof structure ensuring robust operation over time under harsh environments. BioMini Slim 3 provides state-of-the-art Live Finger Detection (LFD) technology by applying machine learning based AI (Artificial Intelligence) which can be upgradeable by BioMini Slim 3 SDK. "BioMini Slim 3 is designed to provide the best reliable performance over dynamic conditions such as outdoor and mobile environments. In addition, we have responded to the increased market demand for FAP30 fingerprint scanners," said Bogun Park, CEO of Suprema ID. "With the range-leading performance and usability, BioMini Slim will lead the emerging FAP30 scanner segment. We will keep focus on providing the best product beyond market expectation with the highest convenience and security," Park added.
Suprema Inc., a provider of biometrics and security solutions, announces that the company has appointed Baudoin Genouville as the managing director for Suprema Systems GmbH. Responsible for Suprema's Pan-European (excluding UK and Ireland) and North African operations, Genouville will be based on both Germany and France offices, where he will lead local sales and technical support team as well as playing key roles in marketing and public relations across Europe. After joining Suprema Inc. in 2013, Genouville has been involved in technical alliances with major security manufacturers, and also played a strategic role in Suprema's recent global rollout and growth in enterprise market. National security industries In recent years, Genouville has moved back from South Korea to Europe with the mission of further growing Suprema local Partners and Suprema presence in national security industries. We have already started for long in the UK then in Americas, Middle-East, finally Asia" “That is not a radical move for Suprema Inc. to localise its Sales and Support closer to our customers. We have already started for long in the UK then in Americas, Middle-East, finally Asia. It is a proven strategy that pays off. With local branches and dedicated staff across Europe, Suprema Inc. will better serve its BioStar2 line distribution Partners. Businesswise, the relation will remain identical, with direct sales to our European certified Partners only (not to end-users). However, our local set-up in Europe will see increased consulting operations and support actions for the benefit of our End-Users,” said Genouville, Managing Director of Suprema Systems GmbH. Improving localised sales "The last 6 years at Suprema Inc. have been fascinating. We are a technology-based company, leader on its product range, quickly implementing changes with dedicated teams working together in the same direction, as a family. I hope to drive that same spirit to our Suprema forces in Europe, for the years to come," Genouville added. Earlier this year, Suprema also appointed Jamie McMillen as Managing Director of Suprema Systems UK Ltd which covers the company's sales and marketing operations over United Kingdom and Ireland market. Along with the company's EU operation, Suprema plans to expand its UK and Pan-European footprints to improve localised sales, marketing and technical support services.
Suprema Inc., a provider of biometrics and security solutions, announces that the company introduces the company's latest range of biometric security solutions at Security Exhibition & Conference 2019 in Sydney, Australia. At the show, Suprema will showcase FaceLite, its latest facial recognition terminal, 2nd generation fingerprint IP readers and enterprise access control solutions. Launched at ISC West in April this year, Suprema extends introduction of the FaceLite in Australia. The FaceLite provides the world's best facial recognition performance in terms of matching speed, operating illuminance and user capacity. In addition to the FaceLite Suprema will demonstrate its range of access control terminals, updated BioStar 2 security platform with visitor management solution. Time attendance applications The new FaceLite is designed for both the enterprise access control systems and time attendance applications by featuring Suprema's technologies and innovative features. Loaded with powerful 1.2GHz CPU and massive 8GB memory, FaceLite achieves incredible matching speed of up to 30,000 matches per second and accommodates up to 30,000 users while providing intuitive face-enrolment GUI for faster user registration. The industry's unique and the most advanced biometrics-based intelligent access controller On the optical side, the new face recognition technology overcomes possible interference from dynamic lighting conditions including sunlight and ambient light. The new technology allows greater range of operating illuminance from zero lux to 25,000 lux which covers almost every possible lighting conditions regardless of indoor or outdoor, day or night. In addition, the company also showcase CoreStation, the industry's unique and the most advanced biometrics-based intelligent access controller. Face recognition technology The new Suprema CoreStation is an intelligent door controller which provides advantages of biometric-enabled security over centralised access control systems. Designed for mid to enterprise-level systems, CoreStation handles up to 500,000 users with incredible fingerprint matching speed of up to 400,000 matches per second. By providing high-performance, biometric readiness and Ethernet communication, CoreStation is capable of offering comprehensive access control functionalities for up to 132 access points along with the company's BioStar 2 security platform. The device also provides centralised biometric template management and also interfaces with complete set of reader technologies including RS-485(OSDP) and Wiegand. Along with the new enterprise access control solution and face recognition technology, Suprema will also showcase the company's extensive range of latest biometrics and access control solutions at Security Exhibition and Conference 2019. To experience latest Suprema products and technologies, please visit Suprema stand(#A8).
A blind spot in governance, risk and complianceDownload
H.265 High Efficiency Coding: Video compression for security applicationsDownload
How to overcome the storage challenges of adopting surveillance AIDownload
- HID DigitalPersona fingerprint biometric solution added to BigWise Stellar POS for greater security
- Armor At Hand partners with AASA and use Smart Shield to boost school safety nationwide
- WorldReach employs Cognitec’s technology to enable ID document applications with smartphones
- Matrix provides time-attendance and access control solution at Al-Khodari Sons Company