New Suprema access reader

November 2017 Access Control & Identity Management, Products

The latest edition to Suprema’s range, BioEntry P2, packs a full list of features into a slim design to offer a comprehensive access control solution. High matching performance and multi-card reading, this mullion-type fingerprint access control device brings a versatile biometric access solution to the African market, regardless of RFID standards and the size of the projects it covers.

BioEntry P2 is suitable for both enterprise level access control systems and SMBs. It has a large 8 GB memory and can accommodate up to 10 000 users and 1 000 000 event logs. Fast access through doors is reinforced with a powerful 1.0 GHz CPU, allowing BioEntry P2 to achieve matching speeds of up 10 000 matches per second.

The most secure device in its class, BioEntry P2 offers accuracy and significantly reduced false rejection rates. These benefits are achieved by combining the new OP5 fingerprint sensor with Suprema’s enhanced fingerprint algorithm, which compensates for unsatisfactory fingerprint captures such as direct sunlight conditions or distorted fingerprint images.

Dual-frequency, multi-card reading technology enhances the P2’s versatility and flexibility in system design by allowing users to effectively integrate BioEntry P2 into legacy systems as well as to provide users with the capability of adopting new authentication methods into their existing system including RFID, mobile and biometrics. P2 supports all HID multiCLASS compatible RFID standards, it features both LF (125 KHz) and HF (13.56 MHz) RFID and reads most types of RFID card standards with a single device including MIFARE, HID iCLASS, DESFire, FeliCa, HID Prox, EM and NFC.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Simple steps to protect yourself against identity theft
November 2019 , Access Control & Identity Management
Are you doing enough to reduce the risk of having your identity stolen?

Read more...
The importance of XDR for cyber protection
October 2019 , Cyber Security, Products
35% of South African organisations are expecting an imminent cyberattack and a further 31% are bracing for it to happen within a year, according to local research conducted by Trend Micro.

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Mobile access is more secure than card systems
Access & Identity Management Handbook 2020 , Access Control & Identity Management
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

Read more...
This is the future. This is what we do.
Access & Identity Management Handbook 2020, ZKTeco , Access Control & Identity Management
ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.

Read more...
The security of biometrics
Access & Identity Management Handbook 2020, ViRDI Distribution SA, IDEMIA , Technews Publishing, Suprema , Access Control & Identity Management
Hi-Tech Security Solutions asks whether your personal biometric data is safe from prying eyes.

Read more...
A picture spoofs a thousand cameras
Access & Identity Management Handbook 2020, NEC XON, Hikvision South Africa, Technews Publishing , Access Control & Identity Management
Hi-Tech Security Solutions looks into the reliability and effectiveness of facial biometrics as well as the concerns about privacy.

Read more...
IoT and behavioural authentication
Access & Identity Management Handbook 2020, CA Southern Africa , Access Control & Identity Management
IoT represents an increasing security risk to individuals in the form of pervasive, always-on monitoring of your personal activity with a potential compromise of your most personal security credentials.

Read more...
Border crossing and national identification
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Amidst a choice of technologies, diversity of policy frameworks, and emergent priorities, countries that intend to upgrade their identification systems today find themselves drawn into a complex vortex.

Read more...
T&A by biometrics in the cloud
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Time and attendance solutions have evolved from punch cards to cost-effective and more accurate cloud-based biometric systems.

Read more...