Software House, part of the Security Products business unit of Tyco, the world’s largest pure-play fire protection and security company, announces the integration of the Stone Lock Pro Biometric Facial Recognition reader from CoprometroUSA® with the C•CURE 9000 security and event management solution (v 2.20 and higher).
Enhancing critical security situations
Stone Lock Pro is an extremely fast and accurate infrared biometric facial recognition device, designed for access control applications that require instant, easy, and reliable confirmation of identity. The combined solution is the ideal application for critical security situations, including campuses, correctional facilities, military bases, and financial and major corporate institutions where a PIN or password alone isn’t enough. Through the deep integration with C•CURE 9000, users have only one personnel database to manage, saving time and reducing problems with duplicate entries, errors, and inefficiency.
“In the most critical security situations, common bad practices such as weak PINs, code sharing, and propping doors make multi-modal verification at the door a requirement,” said Rafael Schrijvers, Product Marketing Manager for Access Control, EMEA, Tyco Security Products. “We’ve taken an innovative, highly reliable facial biometric device and paired it with our cutting-edge C•CURE 9000 access control solution to create a highly effective, easy-to-manage solution built on the power of our Connected Program integration platform.
Using the C•CURE 9000 interface, security personnel can create a Stone Lock Pro user, pair it with a personnel record and credential, and capture facial data remotely from any Stone Lock Pro device within the network. Once enrolled, users just need to present their credential and face the device for quick scanning and authentication. Stone Lock Pro, a modular unit with a built-in keypad and HID iCLASS® SE reader, can scan and plot more than 2,000 facial points in less than a second.
Driven by the power of the C•CURE 9000 solution, all events, permissions, schedules and users are managed conveniently and efficiently to the benefit of security management.