Safran Morpho releases ‘toughest ever’ biometric terminal for harsh conditions

April 2017 Access Control & Identity Management, Products & Solutions

Designed to withstand the most demanding environments, the new MorphoAccess SIGMA Extreme, a ruggedised biometric terminal for access control and time and attendance, is now available in the sub-Saharan African market.

This latest addition to the award-winning SIGMA family of readers is built to endure everything from dust, salt mist and rain, to attempted vandalism and accidental impacts – protected by strong polycarbonate plastics, thick tempered glass and meticulous sealing.

Succeeding the previous-generation Outdoor MorphoAccess 500 series, it capitalises on the latest waves of technology and advancements to give industrial users the most reliable and resilient biometric solutions. It features very responsive touchscreen controls and a biometric sensor that is certainly the largest single fingerprint sensor on the local market.

“This new terminal is impervious to dust, rain and other elements. It is ideally suited for industrial environments, manufacturing plants, mines, construction sites, power plants and the like,” explains Nicolas Garcia, Morpho’s regional director of sales for sub-Saharan Africa.

Every aspect of the MA SIGMA Extreme is designed with the harshest conditions in mind. For instance, an ambient light sensor ensures an ultra-bright touchscreen to improve usability when in direct sunlight and a powerful loudspeaker enables users to catch sound messages even in noisy environments.

Garcia says that the terminal also goes a long way to addressing issues of fraud at sites such as mines and construction sites: “Aside from our world-class, patented fake finger detection technology, the MA SIGMA Extreme also features face detection and picture logging, a ‘duress’ finger option, a timed anti-pass back feature, and the ability to hold lists of banned users.”

Its 16 programmable function keys enable individuals to clock in with different job codes. Storing logs of up to one million records, and integrating directly into holiday scheduling, this helps operations managers keep far closer manage their resources and project costs.

Finally, at software level, the MA SIGMA Extreme boasts a flexible architecture with various software integrations possibilities, to ensure easy deployment and address multiple-use case scenarios.

Find out more about MorphoAccess SIGMA Extreme series at www.morpho.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From wireless alarms to smart homes
Elvey Security Technologies Perimeter Security, Alarms & Intruder Detection Products & Solutions
The final brand SMART Security Solutions features in its discussions with companies operating in South and southern Africa’s detection and alerting technologies market is DSC, distributed in the region by Elvey Security Technologies.

Read more...
The AX Hybrid PRO Series offers reliable wired and wireless protection
Hikvision South Africa Editor's Choice Perimeter Security, Alarms & Intruder Detection Products & Solutions
Hikvision has announced the launch of a new AX Hybrid PRO alarm system with innovative Hikvision ‘Speed-X’ transmission technology. This system offers reliable wired protection while delivering expanded flexibility with seamless wireless integration.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Supercharge surveillance with AXIS Camera Station Pro
Surveillance Products & Solutions
Designed to put efficient surveillance at users’ fingertips with an intuitive interface that is easy to operate, AXIS Camera Station Pro 6.2 provides a customisable video management and access control solution for companies of all sizes.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...