SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check Out Our Special Report On Casino Security

Get it now!

SAFR® From RealNetworks At ISC West 2023

22 Mar 2023

SAFR® From RealNetworks At ISC West 2023
Contact company
Contact RealNetworks Inc.
icon Add as a preferred source Download PDF version
Related Links
  • Combining Technologies At The Entrance To Improve The Customer Experience
  • What Is PKOC? How Will It Make Access Control Solutions More Interoperable?

SAFR™ SCAN from RealNetworks, the AI-powered face authentication solution designed for mainstream commercial applications, will bring its latest computer vision access control solution to Booth 3089 during ISC West 2023, March 29-31 in Las Vegas.

With a focus on security, convenience, and affordability, SAFR SCAN is a frictionless solution that’s environmentally sound and avoids adding to the approximately 300 million plastic proximity cards disposed of or lost each year.

Integrates of SAFR

SAFR SCAN integrates with AMAG Symmetry, Avigilon ACM, Feenics, Genetec Synergis, Johnson Controls C•CURE 9000, PCSC LINC-NXG and Schneider Electric Access Expert software platforms at the API level.  

SAFR SCAN interfaces to any access control system via Wiegand or OSDP connection

SAFR SCAN interfaces to any access control system via Wiegand or an integral, fully encrypted Open Supervised Device Protocol (OSDP) connection.

SAFR’s computer vision code is among the smallest footprints and most efficient offerings in the facial recognition marketplace, making it easy to deploy in edge devices. 

Features of SAFR SCAN

SAFR SCAN authenticates up to 30 individuals per minute and functions as a 3-in-1 device for access control, video surveillance, and video intercom capabilities. 

Since its initial introduction in 2022, SAFR SCAN continues to evolve, adding a powerful feature to help detect and prevent tailgating as well as full-person record export and import capabilities. 

See these and other features at Booth 3089 during ISC West:

  • Certification & expansion with AMAG Technology 

SAFR SCAN biometric access readers now provide direct interface capabilities with Symmetry Access Control from AMAG Technology. The symmetry mobile enrollment application seamlessly enables enrollment to SAFR SCAN for face authentication.

SAFR SCAN biometric access readers now provide direct interface capabilities with AMAG Technology

The SAFR solution allows easy management of credentials, enabling administrators to add or remove users, modify user access levels, and restrict access based on permissions.

This integration provides full record export and import of physical identity credentials as well as batching; mask detection to ensure policy compliance; live detection and real-time spoofing alerts with 98.5% accurate recognition of masked faces; and real-time alerts of unauthorized entry attempts.

  • Feenics Bi-directional Integration

SAFR SCAN now connects directly to the Feenics cloud, allowing for complete system management of transactions, credentials, enrollments, and system configuration. This integration simplifies access control specifications by utilizing the door controller features of SAFR SCAN.

It allows for enrollment, deactivation of credentials, and setting access levels and permissions directly from the SAFR SCAN reader, meaning no panel is required.  

  • Certification of Genetec Integration

SAFR for access control and SAFR for surveillance are officially certified by the Genetec Development Acceleration Program to run with the Genetec Synergis™ access control system and Security Center video management system (VMS).

SAFR video surveillance software integrated with Security Centre yields actionable data from the live video

The SAFR platform provides best-in-class access control with the SAFR SCAN frictionless door station integrated with Synergis and SAFR video surveillance software integrated with Security Center, which yields actionable data from the live video feeds like surveillance watchlist, occupancy, demographic composition, dwell times, and more.

All data passed through SAFR is protected with AES-256 encryption in transmission and at rest.

  • SAFR Key mobile credentials

With mobile credentials continuing to gain popularity, SAFR Key mobile credentials provide an affordable and convenient physical identity solution, enabling users to leverage their smartphones to access secured areas.

SAFR Key uses Bluetooth Low Energy (BLE) to enable communication between the mobile device and SAFR SCAN. The user's mobile device acts as a virtual key and transmits an encrypted code to the access control system to unlock the door.

SAFR Key uses BLE to enable communication between the mobile device and SAFR SCAN

SAFR Key can be used as the only credential read by SAFR SCAN for those who wish to opt out of face authentication or used with face authentication for dual-factor credentialing at high-security doors.

SAFR Key is extremely secure and compatible with the Public Key Open Credential (PKOC) standard, an open specification written and supported by the Physical Security Interoperability Alliance (PSIA).

It is available for both iOS and Android devices and supports a wide range of mobile devices, including smartphones and tablets. 

SAFR SCAN Difference

SAFR SCAN data is secured and encrypted with no facial images

Ideal for both indoor and outdoor environments with changing lighting conditions, SAFR SCAN’s facial recognition technology is 99.9% accurate and uses anti-spoofing technology to ensure the liveness of the individual being authenticated. 

All SAFR SCAN data is secured and encrypted with no facial images being recorded or stored anywhere within the system for further personal privacy protections. 

SAFR SCAN incorporates two types of liveness technologies to combat presentation attacks: structured 3D liveness and RGB liveness.

The SAFR algorithms were developed to minimize bias; SAFR performed best for low bias of all algorithms tested by the National Institute of Standards and Technology (NIST).

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Digital video surveillance
  • IP video surveillance
  • Campus security systems
  • Industrial security
  • Healthcare security
  • Security cameras
  • Covert cameras
  • Security camera systems
  • Security access systems
  • Facial recognition systems
  • Iris recognition systems
  • Video analytics
  • Building security
  • Institute security
  • Industrial security systems
  • IP Surveillance
  • Industrial surveillance
  • Covert Surveillance
  • Integration software
  • Video Management System
  • Internet of Things (IoT)
  • Central Monitoring
  • Network Video Recorders
  • Digital Video Recorders
  • Video Encoders
  • Cloud security
  • Mobile access
  • ISC West
  • Video surveillance
  • OSDP
  • Related links
  • ISC West 2023
  • ELATEC Access control software
  • Event Network Video Recorders (NVRs)
  • Access Control Software Access control software
  • Breakglass Switches Access control accessories
  • Infrared Surveillance cameras
  • Biometric Access control software
  • Card Access control software
  • Breakglass Detectors Access control accessories
  • Detection Software Video Surveillance software
  • PCB Surveillance cameras
  • Real Time / Timelapse Network Video Recorders (NVRs)
  • IP Surveillance Software Video Surveillance software
  • Wireless Surveillance cameras
  • Proximity Access control software
  • Real Time / Timelapse / Event Network Video Recorders (NVRs)
  • Management Software Video Surveillance software
  • Smart Card Access control software
  • Timelapse Network Video Recorders (NVRs)
  • Central Monitoring Option Access control software
  • Centrally managed access solution Access control software
  • Monitoring Software Video Surveillance software
  • Surveillance Software Video Surveillance software
  • Face Recognition Software Access control software
  • High Level Interface Access control software
  • ID Badging Software License Access control software
  • Related categories
  • Surveillance cameras
  • Digital video recorders (DVRs)
  • Video Surveillance software
  • Access control accessories
  • Access control software
  • Network Video Recorders (NVRs)
Related white papers
Physical Access Control

Physical Access Control

Download
Machine Operator Authentication

Machine Operator Authentication

Download
RFID For GMP/GLP Environments

RFID For GMP/GLP Environments

Download
Related articles
The Importance Of Machine Authentication In Plant Safety And Security

The Importance Of Machine Authentication In Plant Safety And Security

Universal Readers Create A Frictionless Access Experience For Orion Entrance Control

Universal Readers Create A Frictionless Access Experience For Orion Entrance Control

Security Considerations For RFID And Mobile Access

Security Considerations For RFID And Mobile Access

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Events news

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec