BioStar 2 Mobile Card
November 2017, Products, Access Control & Identity Management
Suprema BioStar 2 Mobile Card is an application for storing Personally Identifiable Information (PII) in the user’s own smartphone, enabling organisations to support the needs of mobile credential solutions for access control.
Imagine you need to issue access cards to hundreds or thousands of employees and manage your access cards for visitors. Taking all of the cost of buying raw cards, the cost of printing access cards, and the cost of managing them together will be time consuming and costly. Imagine, however, using BioStar 2 and the BioStar 2 Mobile app to issue mobile cards that store biometric information and access privileges to employees and issue mobile cards for visitors to use for a specified period of time. You will be able to operate the system at a much more convenient and economical cost.
BioStar 2 Mobile Card supports BLE (Bluetooth Low Energy) and NFC (Near Field Communication) and therefore works with almost every smartphone today. There is no need for third-party portal services and readers.
Suprema’s BioStar 2 mobile card can be issued directly from BioStar 2 or BioStar 2 Mobile app without using portal services like other systems do. In addition, the BioStar 2 Mobile app, which allows you to directly control the functions of BioStar 2 or monitor system logs, is used together to provide users with a unified user experience (UX).
||+27 11 784 3952
||086 552 0819
- People on the move
November 2017, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
- Access and identity: looking ahead
November 2017, neaMetrics, ZKTeco, Powell Tronics, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.
- Trusting your privilege
November 2017, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.
- The access edge
November 2017, Johnson Controls, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.
- Home run for integrated security
November 2017, Milestone Systems, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, IT infrastructure
Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.
- Facing the future
November 2017, neaMetrics, Virdi Distribution SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?
- Access on the edge
November 2017, Suprema, Access Control & Identity Management, Integrated Solutions
CoreStation handles half a million users with a fingerprint matching speed of up to 400 000 match/second and simultaneous matching speeds of up to 8 devices in 1 second.
- Capturing fingerprints in direct sunlight
November 2017, Suprema, Access Control & Identity Management
Suprema developed and patented its multi-dynamic range (MDR) technology to ensure consistency in the quality of fingerprint images.
- Now your phone is a key
November 2017, Salto Systems Africa, Yale Security (SA), Access Control & Identity Management, Products
With an electronic lock, you can use your smartphone app to check if the door is locked, and lock it (for them) if not.
- Securing your access security
November 2017, G4S South Africa, Impro Technologies, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security
While one may not consider access control solutions a prime hacking target, any connected device is a target in today’s world.
- Ding dong, it’s IP
November 2017, Elvey, TOA Electronics, Zhejiang Dahua Technology, CAME BPT South Africa, This Week's Editor's Pick, Access Control & Identity Management
IP and open standards have taken the security technology world to a new level where proprietary systems and customer lock-in are no longer the global standard.
- Access a mobile-first world
November 2017, Axis Communications SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
Mobile access control enables mobile devices – such as smartphones and wearables – to function as credentials in providing access to secured buildings, rooms and areas.