Morpho goes extreme

May 2017 Editor's Choice, Access Control & Identity Management, Asset Management, News & Events, Security Services & Risk Management

April 2017 saw the international launch of Morpho’s (or Safran Identity & Security’s) MorphoAccess SIGMA Extreme. Morpho SA’s Paul Jeremias also took the opportunity to speak about the future of the company following its acquisition by Advent International.

MA SIGMA Extreme.
MA SIGMA Extreme.

Taking over from the successful Outdoor MorphoAccess range, the Extreme has been designed for use in the most rugged environments and is rated IP65 to protect it from the elements, as well as IK09 to ensure it can handle rough treatment.

Speaking on the product, the company’s Nicolas Garcia said the Sigma Extreme’s polycarbonate housing made it a tough device able to withstand UV and weathering, as well as vandalism. This includes the capacitive touch screen, which is unharmed when a 500 g steel ball is dropped on it from a height of 2 m.

To cater for damaged fingerprints or potential dirt on individual’s fingers when using the scanner, the Extreme sports a 23 mm x 23 mm optical sensor, which the company says is the biggest on the market. The sensor is FBI PIC IQS certified. The Extreme also includes a loudspeaker in case instructions need to be given to users in noisy environments and a microphone, allowing for 2-way communication.

In cases where additional security is required, the system can also include a camera. This will allow companies to set up the system to only recognise a fingerprint if someone is standing in front of the reader, or it can be used for situational awareness as a control room can access the camera to view a situation at an entrance, for example. The Extreme can also be used as an IP videophone.

A full web server is also onboard. This will allow administrators to connect to the device directly to set it up, enrol fingerprints or access transactional logs. The Extreme can also be set up remotely from a central server. Morpho has also made it easy to integrate the product into existing access or time-and-attendance scenarios with various software options.

For organisations still using card access, either as stand-alone or multi-factor security solutions, the Extreme has the option to use a variety of contactless cards as well. The card options include Prox, iClass, MiFare/DESFire/NFC.

Opportunities ahead

Jeremias addressed the future of the company briefly in light of the news last year that Advent International was going to be the new owner after its 2.4 billion euro acquisition. He stated that there would be changes to the company due to Advent also having Oberthur in its stable, but reassured customers that it was business as usual and that Morpho SA would still be focusing on its customers and users to ensure a seamless transition. As proof of this commitment, he noted the new employees Morpho has brought on board over the past year, who were present at the event.

Oberthur Technologies is a global player in digital security solutions for the mobility space. The company provides end-to-end solutions in smart transactions, mobile financial services, machine-to-machine, digital identity and transport and access control fields, employing over 6 000 employees worldwide. The technologies from the two companies are therefore complementary and Jeremias said the companies would spend the next couple of months strategising on the road ahead and how to optimise the strengths of both companies.

A new entity will emerge, with a new name, but this will only be announced later this year. Jeremias also noted that the changes would only provide additional benefits to clients and the combination of two market leaders would only serve to enhance the confidence customers have in the products and services available.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...