Web-based open security platform

May 2015 Access Control & Identity Management

Suprema has launched BioStar 2, a Web-based IP access control platform. BioStar 2 seamlessly integrates Suprema’s biometric technology with an enhanced security solution to offer simplicity, convenience and performance.

Built with a new design style that focuses on enhancing user experience, all of the functions and features of BioStar 2 can be used with only a few simple clicks. The system is accessible via Web browsers, making the system independent from operating systems or device platforms.

The convenience of the system is driven by a number of automations throughout installation and maintenance. Automatic device discovery avoids tedious manual data input and detection processes. This feature allows the installer to simply select and configure the device from the list of connected devices within the network. Additionally, all future updates for BioStar 2 will be made available from a cloud-based resource. The optional automatic update feature will ensure that the system is up-to-date with the latest versions of firmware made available.

BioStar 2 offers performance with the ability to handle large system capacities. The system can accommodate up to 1000 devices. The data transfer to large numbers of devices is processed via Hyper Data Transfer to reduce the system downtime during maintenance. The system also allows unlimited time schedules and advanced user group settings to support complex access control setups.

“Suprema is excited to introduce the next generation access control solution that is fitting for the current technological environment,” said Young S. Moon, vice president of Suprema. “We believe that the current technological environment is progressing in such a dynamic way, that securing flexibility and versatility to the new system was one of the key objectives. The system is developed to be Web-friendly using the latest Web standards and is not dependent on any specific operating system or client device unlike a number of different solutions in the market. With the newly found versatility, we expect BioStar 2 to serve as a foundation that we develop and expand to satisfy our customers’ growing needs.”

“This new technological leap in access control shows Suprema’s commitment to lead the way,” adds Walter Rautenbach, MD of neaMetrics, the distributor of Suprema for southern Africa. “BioStar 2 assists in overcoming many of the problems, in access control, specific to the African environment by offering clients and system integrators secure cloud-based management, in-house or outsourced, where needed. With this said, it still caters for offline operation required due to the current network and power infrastructure problems. We are looking forward to the flexibility and change this will bring to security implementations in Africa.”

For more information contact Suprema, +27 (0)11 784 3952, [email protected], www.suprema.co.za or neaMetrics, 0861 632 638, [email protected], www.neametrics.com



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...