Suprema BioStar 2.1, Open Security Platform, Offers Improved Usability And Expandability For Users And Developers
Suprema BioStar 2.1, Open Security Platform, Offers Improved Usability And Expandability For Users And Developers

The new Suprema BioStar 2.1 includes number of software and hardware that further improves usability and expandability of the platform. The release includes BioStar 2 API, BioStar 2 Device SDK, and BioStar 2 Cloud Solutions. Additionally, the platform expands its product portfolio to include BioStar 2 Mobile App and DM-20 multi-door control module. The platform offers number of different integration options via its API or Extensions Framework. The new device SDK enables other security solutions to directly manage Suprema devices. Along with mobile app and DM-20, the enhanced built-in access control functionality allows system designers to configure complex systems and have users to easily maintain the system.  Development Support The comprehensive line up of software tools give developers wide range of development options for BioStar 2. BioStar 2 API is a set of REST APIs, which uses JSON formatted data for requests and responses for easier understanding. The API is designed to manage complex operations so that developers can focus on developing customer access control system or integrating biometrics into 3rd party systems. If developers wishes to use BioStar 2 as the basis of development platform, they can use extension framework to incorporate additional functionality into BioStar 2.  BioStar 2 functionality is built with concept of modularized application. The enhanced access control feature is offered as an additional module to the core platform and it is developed using BioStar 2 API. The API itself will be available as an open source software for developers to use it as a reference for custom development. Furthermore compact BioStar 2 server requires minimal system resources and provides flexibility to be installed in multiple hardware such as Time Attendance terminal, NVR, NAS or IoT Hub.  Extended Usability BioStar 2.0 offered high user convenience such as automatic user synchronization, device discovery and update notification. The 2.1 release extends user convenience and combines new enhanced access control features to extend usability of the platform. The new features include ability set anti-passback and fire alarm rules to provide more comprehensive solution. User convenience is also extended through user import/export feature to manager large users quickly and efficiently.  The DM-20 accessory can be connected to Suprema master device to be used to replace traditional legacy controllers and use 3rd party Wiegand readers to configure the system. BioStar 2 Mobile App that has been developed using BioStar 2 API gives access freedom by utilizing connection through BioStar 2 Cloud to control the system and perform multiple operations. It can manage users on the fly, control doors remotely, and receive notification even when the operator is not monitoring a stationary client window.

Add to Compare

Access control systems & kits - Expert commentary

Physical Access Control: Critical Steps To Ensure A Smarter Future
Physical Access Control: Critical Steps To Ensure A Smarter Future

Steven Kenny, Axis Communications, looks at the benefits of physical access control systems within smart environments, and how knowledge gaps and dated methods can inhibit adoption. Physical security is becoming more dynamic and more interconnected, as it evolves. Today’s modern access control solutions are about so much more than simply opening doors, with digitalization bringing multiple business benefits, which would simply not be possible using traditional models. Digital transformation While the digital transformation of processes and systems was already well underway, across many industries and sectors, it is the transformation of physical security from a standalone, isolated circuit, to a network-enabled, intelligent security solution that brings many benefits to the smart environment. Yet, with more organizations now looking to bring their physical security provision up to date, there are many considerations that must be addressed to maximize the potential of access control and video surveillance. Not least of which is that connecting physical security devices to a network presents risk, so it is increasingly important for IT teams to play a role in helping to facilitate the secure integration of physical and network technologies, as these two worlds increasingly converge. Improved access control in smart environments These urban constructs are capable of reducing waste, driving efficiencies and optimising resources The smart city offers significant benefits, reflected in the US$ 189 billion that is anticipated to be spent on smart city initiatives globally by 2023. These urban constructs are capable of reducing waste, driving efficiencies, optimizing resources and increasing citizen engagement. Technology, which is increasingly being incorporated to protect access points within the smart environment, can take many forms. These range from simple card readers to two factor authentication systems, using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. Frictionless access control During the COVID-19 pandemic, frictionless access control has provided an effective ‘hands free’ means of accessing premises, using methods such as QR code readers and facial recognition as credentials to prove identity. Frictionless access control brings health and safety into the equation, as well as the security of entrances and exits, minimizing the risk of infection, by removing the need to touch shared surfaces. Such systems can be customized and scaled to meet precise requirements. Yet, an increasing integration with open technologies and platforms requires collaboration between the worlds of physical security and IT, in order to be successful. Barriers to adoption Traditional suppliers and installers of physical security systems have built up a strong business model around their expertise, service and knowledge. Network connectivity and the IoT (Internet of Things) present a constantly shifting landscape, requiring the traditional physical security vendor to learn the language of IT, of open platforms, IP connectivity and software integration, in order to adapt to market changes and remain relevant. Many are now beginning to realize that connected network-enabled solutions are here to stay Those who cannot adapt, and are simply not ready for this changing market, risk being left behind, as the physical security landscape continues to shift and demand continues to increase. With end users and buyers looking for smarter, more integrated and business-focused solutions from their suppliers, it is clear that only those who are prepared will succeed in this space. Time will not stand still, and many are now beginning to realize that connected network-enabled solutions are here to stay, particularly within smart constructs which rely on such technology by their very nature. The importance of cyber hygiene Connecting any device to a network has a degree of risk, and it is, therefore, imperative that any provider not only understands modern connected technologies, but also the steps necessary to protect corporate networks. Cameras, access control systems and IP audio devices, which have been left unprotected, can potentially become backdoors into a network and used as access points by hackers. These vulnerabilities can be further compromised by the proliferation of connected devices within the Internet of Things (IoT). While the connection of devices to a network brings many advantages, there is greater potential for these devices to be used against the very business or industry they have been employed to protect when vulnerabilities are exploited. Cyber security considerations Cyber security considerations should, therefore, be a key factor in the development and deployment of new security systems. Access control technologies should be manufactured according to recognized cyber security principles, incident reporting and best practices. It is important to acknowledge that the cyber integrity of a system is only as strong as its weakest link and that any potential source of cyber exposure will ultimately impact negatively on a device’s ability to provide the necessary high levels of physical security. The future of access control There is a natural dispensation towards purchasing low-cost solutions There is a natural dispensation towards purchasing low-cost solutions that are perceived as offering the same value as their more expensive equivalents. While some have taken the decision to implement such solutions, in an attempt to unlock the required benefits, while saving their bottom line, the limited lifespan of these technologies puts a heavier cost and reputational burden onto organizations by their association. The future of access control, and of physical security as a whole, will, therefore, be dependent on the willingness of suppliers to implement new designs and new ways of thinking, based around high-quality products, and to influence the installers and others in their supply chains to embrace this new world. Cyber security key to keeping businesses safe In addition, cyber security considerations are absolutely vital for keeping businesses safe. The integration of cyber secure technologies from trusted providers will provide peace of mind around the safety or corporate networks, and integrity of the deployed technologies. As we move forward, access control systems will become data collection points and door controllers will become intelligent I/O devices. QR codes for visitor management and biometric face recognition for frictionless access control will increasingly be managed at the edge, as analytics in a camera or sensor. The future of access control presents an exciting and challenging time for those ready to accept it, to secure it and to help shape it, offering a true opportunity to innovate for a smarter, safer world.

Automatic Gates – The Latest Development In Access Control
Automatic Gates – The Latest Development In Access Control

Automatic gates remain an increasingly popular security choice for family homes, business premises or public buildings – anywhere that full control over access is needed. While there is much to consider for installers when advising clients on the right solution for their property, from the size, weight and cost of a gate system, it’s useful to be aware of the latest developments in the market, as this can help to find the right option to fit their needs. The need for speed Gates can be automated to either swing or to slide open, and there are many factors to take into consideration, when advising on which option to use. However, swing gate motors tend to be slower than the speeds achievable for sliding gates, which means the latter are usually more popular, especially for commercial sites where timing can be among the more important factors. One of the most recent developments in the sliding gates market is the introduction of faster motors One of the most recent developments in the sliding gates market is the introduction of faster motors, such as those from Bft Automation, which allow for opening and closing at a quicker speed than has previously been achievable. Fast authorized access control From a security point of view, the ability to allow people and goods in and out of a property at a quicker pace reduces the risk of unauthorized entry, while waiting for a gate to close – an important consideration in both commercial and residential contexts. Other benefits of a faster motor include reduced waiting times. This can be particularly useful for properties in busy areas, where a vehicle could risk blocking traffic, while waiting to turn into a site controlled by a slower gate. Faster motors Also, a faster motor could potentially reduce the risk of an accident from vehicles entering a property at speed. For example, this might happen if someone was making their first visit to a property situated off a fast road in an unfamiliar area. Beyond these practical considerations, in today’s fast-paced world, people aren’t as used to having to wait for things and this applies to the time it takes to get in and out of their own property. So, security benefits aside, faster motors are likely to be more appealing for clients who have sliding gates fitted to their domestic property and who prioritize convenience. The choice of which of the new faster motors to use will be impacted by a number of factors, including the weight of the gates. Essentially, the lighter the gate is the higher the speed achievable. And, as always, it’s important to make sure that any installation complies with safety regulations. Intelligent torque management systems A further development in access control technology includes intelligent torque management systems A further development in access control technology includes intelligent torque management systems, which update the level of torque required to perform the gate’s operation, allowing it to work at the optimum level, regardless of weather conditions, temperature or the degree of wear and tear on the device. Depending on the typical weather conditions experienced at the site and the anticipated frequency of use, it’s worth looking at options that take these factors into account. Importance of security rights In some scenarios, it’s important for particular individuals to have security rights. In which case, there are motors available that come with personalized keys, which are unique, providing an additional level of security. Installers often face the challenge of fitting gate motors in confined spaces, potentially making for a time consuming and technically demanding task. Available space When you only have a small space to work with, simple details can go a long way to helping you. For example, by putting the fastening screws on the front of a motor’s casing, installation and maintenance are easier and more convenient, even in particularly compact areas. Working with suppliers that offer more than just a manual means you’ll have access to advice and support on how new products work in practice and what you need to consider before advising on an installation.

Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)
Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)

Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualization platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analyzed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualization. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centers of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualization and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Center, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organization’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favor of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centers, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centers. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organizations with physical and cyber security needs.

Latest Suprema news

Secure Logiq Partners With 360 Vision, AMG, Cortech, Harper Chalice And Suprema To Host The CNI Security Technologies Webinar
Secure Logiq Partners With 360 Vision, AMG, Cortech, Harper Chalice And Suprema To Host The CNI Security Technologies Webinar

Secure Logiq is joining forces with 360 Vision Technology, AMG Systems, Cortech Developments, Harper Chalice and Suprema, to present a free webinar dedicated to Critical National Infrastructure (CNI) security technologies. CNI security technologies webinar The 1-hour session will take place on Wednesday 28th July at 10am BST (05.00 EDT, 09.00 UTC, 11.00 CEST, 13.00 GST 17.00 SGT) and has been created to offer practical support for those responsible for safety and/or security in the utilities, power, prisons and nuclear CNI sectors, including consultants and installers. The security of Critical National Infrastructure has never been more important or more under threat" “The security of Critical National Infrastructure has never been more important or more under threat,” said Secure Logiq’s Robin Hughes, adding “By partnering with these like-minded manufacturers who offer complementing solutions in the CNI space we will use this webinar to deliver a complete system overview. Our hope is to provide an informative and entertaining discussion around the subject with expert insights from across the solutions space.” Covering asset protection and risk management Named CNI Security Technologies - Optimising Risk Management and Asset Protection in the CNI sector, the webinar will cover how effective risk management and mitigation, asset protection, regulatory compliance and cost reduction can be achieved, via the use of innovative technologies. Thanks to the combined expertise of the manufacturers involved, a state-of-the-art, end-to-end solution, which is specifically designed for CNI security applications, will be presented to attendees. cyber secure optical, thermal, and radar camera systems Topics being covered will include cyber secure optical, thermal, and radar camera systems, effective and innovative perimeter detection (PIDS), secure network backbone design for large infrastructures, flexible biometric access control with multi-factor and differentiating authentication, and optimized server and storage solutions that can provide a modular and scalable core platform for unrivaled interoperability of third-party security systems, via a centralized single platform hub. “Our aim is for this webinar to be an educational experience for professionals in the CNI sector,” concludes Robin Hughes, adding “We want to create an open discussion around cutting edge technology for Critical National Infrastructure rather than just a dry presentation, and with the additional Q&A session, we want to make this as interactive as possible.”

Suprema Showcases BioStar 2 Access Control Solutions At ISC West 2021
Suprema Showcases BioStar 2 Access Control Solutions At ISC West 2021

Suprema, a global pioneer in access control, biometrics, and time & attendance solutions, is showcasing its latest access control solutions at ISC West 2021. ISC West 2021 marks the first year Suprema is operating a stand-alone booth at ISC West and Suprema is demonstrating advanced access control features of its BioStar 2 solution along with new products, X-Station 2 and FaceStation F2, that are equipped with contactless features suitable for the post-pandemic era. BioStar 2 access control solution At the Suprema booth, visitors can see how BioStar 2 access control solution can be deployed to strengthen security in enterprise settings. Control rooms will hold Suprema’s intelligent controller, CoreStation, along with devices to operate BioStar 2 security platform. Different access control devices can be installed at different sections of office buildings for strengthened security and enhanced convenience. For example, RFID card readers can be installed at meeting rooms to grant temporary access for visitors while offices and server rooms that require advanced security can be controlled with biometric technology like fingerprint and face recognition. Suprema booth visitors can also get a glimpse of BioStar 2’s elevator control features. X-Station 2 and FaceStation FaceStation F2 is equipped with contactless features like mask detection and remote enrollment via photo uploads Suprema’s new products, X-Station 2 and FaceStation F2 are also being displayed with detailed explanations of their contactless features. X-Station 2 is a versatile RFID card reader that also supports cellphone credentials including QR codes. Cellphone credentials and QR codes can be issued and revoked remotely, eliminating the need for physical contact. FaceStation F2, Suprema’s flagship face recognition terminal that combines IR and visual recognition to achieve a false acceptance rate of 1 in 10 billion is also equipped with contactless features like mask detection and remote enrollment via photo uploads. When installed in combination with a thermal camera, FaceStation F2 can also detect elevated temperature, limiting the access of people with fever and helping to contain the pandemic. Showcasing access solutions “ISC West 2021 is the first international conference Suprema is participating in since the outbreak of COVID-19.” “We are happy to be able to meet customers and partners face-to-face to introduce our latest products and innovative BioStar 2 access control solutions. Our solutions have much to offer especially in the post-pandemic era and we are always eager to hear customer feedback,” said Bob Carrino, sales director at Suprema America.

Suprema’s New X-Station 2 Supports Cellphone Access, QR Codes And RFID Cards
Suprema’s New X-Station 2 Supports Cellphone Access, QR Codes And RFID Cards

Suprema, a global pioneer in access control, biometrics, and time & attendance solutions, announced the new product launch of the X-Station 2, a versatile intelligent terminal with credential options of cellphone access, QR, and barcodes as well as RFID cards and PIN. Multiple credential options X-Station 2 enables flexible access control system design by supporting multiple credential options. The terminal is compatible with most types of existing RFID cards including EM, MIFARE, iCLASS, DESFire, and FeliCa, but also lets users go card-less by offering cellphone credential options including QR codes and barcodes. The terminal can read QR codes and barcodes composed of up to 32 ASCII code strings issued on Suprema BioStar 2 or 3rd party systems. X-Station 2 can also communicate with NFC and BLE signals, allowing both Android and iOS device owners to use cellphone access. Key features  X-Station 2 improves security while safeguarding user data Equipped with a secure boot process, Open Supervised Device Protocol (OSDP), and cameras for image log capture, X-Station 2 improves security while safeguarding user data. X-Station 2 is also easy to install, use and maintain with features like Power over Ethernet (PoE), intuitive GUI on a 4” wide touchscreen, and IP65 rating. Versatile options X-Station 2’s various credential options allow it to meet all kinds of access control needs. Visitors can be issued QR codes or temporary mobile access cards while employees and registered users can use RFID cards and PIN codes to access areas that require additional security. When used in combination with BioStar 2 or 3rd party software with time and attendance, HR management features, X-Station 2 can track employee work hours, completed tasks as well as vacation days, photocopy credits, canteen tickets, and subscription validity. “X-Station 2 is a truly versatile terminal that can be installed in any facility with time and attendance, visitor management, and access control needs. Its cellphone credential options of QR code and mobile access cards can also satisfy contactless and non-face-to-face needs. I’m excited to see how the market will respond to X-Station 2,” said Hanchul Kim, CEO of Suprema Inc.

Related white papers

School Security Moves to the Cloud

Wireless Access Control eBook

Four Areas to Consider in Frictionless Access Control