A logical solution for cyber solutions

March 2019 Cyber Security, Access Control & Identity Management, Products

BioMini Slim 2 is a thin, FBI PIV and FBI Mobile ID certified FAP20 optical scanner with a large platen for easy capturing of fingerprints.

In the logical access security realm, BioMini Slim 2 can be integrated into cybersecurity solutions to get rid of passwords and deliver secure biometric access to IT systems in various environments to ensure data safety. What’s more, the device’s small footprint provides improved portability for mobile use and its IP65-rated waterproof structure allows for robust operation in most environmental conditions.

Designed for easy integration into new and existing systems, the BioMini Slim 2 SDK features cross-platform compatibility for Android, Windows and Linux, and features a multi-threaded code design for multi-core CPU utilisation.

This high-quality scanner provides advanced Live Finger Detection (LFD) technology that distinguishes fake fingerprints made from various materials including clay, rubber, silicon, glue, paper, film and more. LFD is essential to curb the most elementary fraud, being the use of falsified fingerprints.

The Slim 2 also features Suprema’s proprietary MDR technology that enables the scanner to acquire fingerprints regardless of external light or fingerprint conditions, even under 100,000 LUX direct light, which is equivalent to direct sunlight, making this the ideal fingerprint reader for logging in just about anywhere.

Major international game-players that have integrated BioMini Slim 2 into their solutions include Citrix, IdentaZone, M2SYS and top international hardware providers such as BioRugged and Taztag.

Local software engineering support gives our clients the ability to fast track development and shorten the time-to-market. We offer our knowledge in biometric implementations, gained from 22 years’ African experience, to solution providers, taking solutions from concept to implementation in the shortest possible time while adhering to best practices.

For more information contact Suprema, +27 11 784 3952, enquiry@suprema.co.za, www.suprema.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Minding the gaps to protect industrial PLCs from cyber threats
November 2019, AVeS Cyber Security , Cyber Security
PLCs, designed to control machinery and specific processes, were never built with cybersecurity threats in mind and protecting PLCs against these threats requires healthy isolation from the Internet.

Read more...
Pwn2Own hacking contest to include industrial control systems
October 2019 , Cyber Security
As IT and OT converge under Industry 4.0 and digital transformation initiatives, security gaps are emerging in a range of popular industrial control systems.

Read more...
Stolen credentials on the Dark Web
October 2019 , Cyber Security, Security Services & Risk Management
Over 21 million credentials belonging to Fortune 500 companies, 16 million of which were compromised during the last 12 months, are up for sale.

Read more...
Stolen credentials on the Dark Web
October 2019 , Cyber Security, Security Services & Risk Management
Over 21 million credentials belonging to Fortune 500 companies, 16 million of which were compromised during the last 12 months, are up for sale.

Read more...
The importance of XDR for cyber protection
October 2019 , Cyber Security, Products
35% of South African organisations are expecting an imminent cyberattack and a further 31% are bracing for it to happen within a year, according to local research conducted by Trend Micro.

Read more...
Enterprise security must change
October 2019 , Cyber Security, Security Services & Risk Management
The recent wave of cyberattacks against local banks has highlighted the importance of protecting data against malicious users.

Read more...
Kaspersky uncovers zero-day in Chrome
October 2019, Kaspersky , News, Cyber Security
Kaspersky’s automated technologies have detected a new exploited vulnerability in the Google Chrome web browser.

Read more...
Cybersecurity for video surveillance systems
September 2019, Mobotix , Cyber Security, CCTV, Surveillance & Remote Monitoring
Video surveillance systems are increasingly accessible over any IP network, which has led to the rise of potential cyberattack.

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
The security of biometrics
Access & Identity Management Handbook 2020, ViRDI Distribution SA, IDEMIA , Technews Publishing, Suprema , Access Control & Identity Management
Hi-Tech Security Solutions asks whether your personal biometric data is safe from prying eyes.

Read more...