Card-less and carefree

Issue 4 2021 Products & Solutions, Access Control & Identity Management

Suprema’s latest multi-technology terminal, X-Station 2, is a versatile terminal for time and attendance, visitor management and access control and offers employees, visitors and other types of users a contactless and non-face-to-face access solution that is both safe and secure.

To achieve total card-less operation, X-Station 2’s mobile credential options include mobile access cards and QR codes and barcodes. The terminal uses NFC and BLE signals which allows both Android and iOS device owners to use mobile access cards. QR codes and barcodes must be composed of up to 32 ASCII code strings and are issued on Suprema BioStar 2 or third-party systems.

However, if you prefer to use traditional cards, X-Station 2 also offers comprehensive RFID card compatibility by supporting both LF (125 kHz) and HF (13.56 MHz) RFID as well as various card types including EM, MIFARE, MIFARE Plus, iCLASS, DESFire and FeliCa. PIN is also an option.

When used in combination with BioStar 2 or third-party software with time and attendance or HR management features, X-Station 2 can track employee work hours, completed tasks as well as vacation days, photocopy credits, canteen tickets and subscription validity, while QR codes or temporary mobile access cards offer a secure solution for visitors.

Another feature offered by X-Station 2 is an intuitive UI which enables quick and easy access to functionality on its 4-inch capacitive touchscreen with a customisable display for branding purposes. It has an IP65 rating for dust and water resistance and can therefore be installed in many different environments, both indoors and outdoors. What’s more is that X-Station 2’s large memory can meet enterprise needs. Its 16 GB Flash and 1 GB RAM can handle up to 500 000 users, 5 million text logs and 50 000 image logs.

X-Station 2 is also easy to install. Power over Ethernet (PoE) is supported for convenient installation with less wiring, as well as various other interfaces such as Wiegand, RS-485, TTL input and Relay.

For enhanced security and data protection, X-Station 2 guards against malware attacks and data breaches with a secure boot process. By supporting OSDP (Open Supervised Device Protocol), the terminal encrypts bi-directional RS-485 communication. Using the built-in camera, X-Station 2 can also capture image logs for added security.


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Bringing fire safety closer to home
SafeQuip Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.

Read more...
The role of safe storage in mitigating burglary and fire risk
Gunnebo Safe Storage Africa Products & Solutions Fire & Safety Smart Home Automation
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.