Software House, part of the Security Products business unit of Tyco, the world’s largest pure-play fire protection and security company, announces the integration of the Stone Lock Pro Biometric Facial Recognition reader from CoprometroUSA® with the C•CURE 9000 security and event management solution (v 2.20 and higher).

Enhancing critical security situations

Stone Lock Pro is an extremely fast and accurate infrared biometric facial recognition device, designed for access control applications that require instant, easy, and reliable confirmation of identity. The combined solution is the ideal application for critical security situations, including campuses, correctional facilities, military bases, and financial and major corporate institutions where a PIN or password alone isn’t enough. Through the deep integration with C•CURE 9000, users have only one personnel database to manage, saving time and reducing problems with duplicate entries, errors, and inefficiency.

“In the most critical security situations, common bad practices such as weak PINs, code sharing, and propping doors make multi-modal verification at the door a requirement,” said Rafael Schrijvers, Product Marketing Manager for Access Control, EMEA, Tyco Security Products. “We’ve taken an innovative, highly reliable facial biometric device and paired it with our cutting-edge C•CURE 9000 access control solution to create a highly effective, easy-to-manage solution built on the power of our Connected Program integration platform.

Using the C•CURE 9000 interface, security personnel can create a Stone Lock Pro user, pair it with a personnel record and credential, and capture facial data remotely from any Stone Lock Pro device within the network. Once enrolled, users just need to present their credential and face the device for quick scanning and authentication. Stone Lock Pro, a modular unit with a built-in keypad and HID iCLASS® SE reader, can scan and plot more than 2,000 facial points in less than a second.

Driven by the power of the C•CURE 9000 solution, all events, permissions, schedules and users are managed conveniently and efficiently to the benefit of security management.

Download PDF version Download PDF version

In case you missed it

Proactive security: the future of perimeter defence
Proactive security: the future of perimeter defence

The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. W...

What are the benefits, and drawbacks, of AI in security?
What are the benefits, and drawbacks, of AI in security?

Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthrou...

ASSA ABLOY solution: Digital cabinet locks help Helsinki Airport to improve regulatory compliance and passenger safety
ASSA ABLOY solution: Digital cabinet locks help Helsinki Airport to improve regulatory compliance and passenger safety

Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is...