Suprema BioEntry P2 Compact IP Fingerprint Device
Technical Specification
- Make: Suprema
- Model code: BioEntry P2
- Reader Type: Biometric
- Standalone/ Networkable: Standalone
- Read Range mm: 30 ~ 50 mm mm
Suprema BioEntry P2 is a compact fingerprint access control device featuring Suprema’s next generation biometric technology and security platform. BioEntry P2 provides class-leading performance and security by featuring Suprema’s latest fingerprint algorithm coupled with powerful 1.0GHz CPU. Packed in a mullion-type sleek design, BioEntry P2 also provides added flexibility in system design by featuring multi card reading with dual-frequency RFID card technology.
Read more| Make | Suprema |
|---|---|
| Manufacturer | Suprema |
| Category | Access Control>Access control readers |
| Model code | BioEntry P2 |
| Reader Type | Biometric |
| Standalone/ Networkable | Standalone |
| Read Range mm | 30 ~ 50 mm mm |
| LED / Beep | Multi-colour LED / Multi-tone Buzzer |
| Wiegand Interface | Yes |
| Electrical Specifications | Voltage: 12 V DC |
| Physical Specifications |
Dimensions mm: 50 x 164 x 38 Weight g: 162 |
| Environmental Specifications |
Operating Temp oC: -20 ~ +50 C (-4 ~ +122 F) Operating Humidity %: 0 ~ 80 |
| Additional info |
Suprema BioEntry P2 is a compact fingerprint access control device featuring Suprema’s next generation biometric technology and security platform. BioEntry P2 provides class-leading performance and security by featuring Suprema’s latest fingerprint algorithm coupled with powerful 1.0GHz CPU. Packed in a mullion-type sleek design, BioEntry P2 also provides added flexibility in system design by featuring multi card reading with dual-frequency RFID card technology.
|
Related Whitepapers
Access and security in the age of hybrid working
Integrated access control: reap the benefits of connected security
Three essential reasons to upgrade your access control technology in 2022
One system, one card
DownloadEnhancing physical access control using a self-service model
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadHow to implement a physical security strategy with privacy in mind
Download

