01 Oct 2019
AVAX S200

AVAX S200

AVAX S200 Tripod Turnstile

AVAX S200 Tripod Turnstile has a 100 V (AC) to 240 V (AC) power supply. With a maximum power consumption of 35 watts, our turnstile offers double-sided access. > The AVAX S200 Tripod Turnstile with 44 OP protection levels has dimensions of 1000 mm x 220 mm x 980 mm. You can safely choose for access controls.

AVAX S200 Tripod Turnstile Technical Specifications

Transition Range:  ≤ 550 mm
Yield Ratio:  35 p / m
Power Supply:  100-240V / (ac)
Operating Voltage:  24 V / (ac)
Max Power Consumption:  35W
Frequency:  50-60 Hz
Protection Level:  > 44 IP
Operating Temperature:  -25 to +70 degrees
Dimensions without Rods:  1000 mm x 220 mm x 980 mm
01 Oct 2019
avax-mc6

AVAX MC6 LED CAR PARKING BARRIER

AVAX MC6 LED CAR PARKING BARRIER

Avax MC6 LED Parking Barrier arm length is 6 meters. Its body is aluminum alloy and it has an IP65 protection class and electronic powder coating compression technology. This barrier has excellent working performance and is developed for intensive use. Thanks to its strong spring, it eliminates all blind spots to ensure perfect opening.

AVAX MC6 LED Barrier Technical Specifications

Barrier Case: It produced with aluminum alloy body, IP65 protection class, and electronic powder coating compression technology. The leds in the entrance direction are used for lighting and information purposes.
Barrier Motor: Powerful 220V motor-driven energy saving concept and uses the lowest possible rotational speed with proprietary force return rate technology to achieve high-speed opening.
Powerful Mechanical Structure: It has developed mechanical structure for intensive use up to 100% duty cycle and has parts made of aluminum alloy profile protected by two layers of paint.
Excellent Operating Performance: Electronic rotation speed control by the controller ensures precise barrier movement and works quickly, silently and uniformly.
Powerful Spring Structure: The new design spring eliminates all blind spot areas to ensure stable opening and closing. The spring pressure can be adjusted manually.
Power: 220AC/AC110  50/60HZ
Protection Class: IP65
Working Cycles: 5 million cycles
Input Interface: + 12V signal or 100MS pulse signal width
Material: Aluminum alloy profile
Duty Cycle: 100%
Case Dimensions: 35 cm × 29.5 cm× 106 cm
Barrier Weight: 50 kg.
Remote Control Distance: Kontrol30M
Height from ground (from the ground): 83 cm
Arm Speed: 3s / 6s
Maximum Arm Length: 6 meters

23 May 2019

RACS 5 System Integration with KONE DCS Elevators System

Roger Access control
#Star_Technology_STC, #ROGER

The RACS 5 system enables the implementation of access control in KONE DCS elevators with KONE group elevator controller (KGC). Two scenarios for RACS 5 and DCS systems operation are available. Based on ELI protocol user can choose destination floors in accordance with previously assigned access rights or based on RCGI protocol the system automatically assigns elevator to user to take such user to destination floor according to previously assigned access rights.

In each of the mentioned scenarios, an access terminal (usually proximity reader) is used to identify the user calling the elevator. Such readers can be installed both inside the elevator (COP variant) and outside it (the DOP variant). It is also possible to install the reader in the elevator control panel. The access rights to particular floors are defined in the same way as access rights to doors including among others schedules, calendars, exceptions and special access modes such as unlocked mode, locked mode or emergency access modes. The elevator call is made with user identifier and it enables to distinguish elevator call type (personal lift, goods elevator, etc.).

The configuration of floor access rights is possible with RACS 5 system management software (VISO). The MC16-EVK controller and
the MCI16-EVK communication interface which acts as a gateway to the elevator management server are required for integration with the KONE DCS elevator system. The MC16-EVK controller supports 128 floors. The integration with KONE DCS system is available in the licensed version of the VISO EX management software.

15 Apr 2019
RBH ACCESS CONTROL integra 32

rbh integra32

Integra32 Security Management System seamlessly integrates Access Control, Intrusion Alarms, Elevator Control, CCTV & DVR, Biometric Authentication, Photo ID, Building Automation, and ON and Offsite Alarm Monitoring, into an elegant and versatile building management and security system

RBH ACCESS CONTROL integra 32
RBH ACCESS CONTROL integra 32

Integra32’s advanced .NET architecture is specifically designed to take advantage of Microsoft Windows operating systems. This user-friendly software ensures that security management needs are met easily and economically with minimal training

With a fully featured client or Web browser access to system management, Integra32 addresses all security management needs for small and medium-size businesses and organizations. There is no limit to system expansion with an in-place upgrade path to our AxiomV Enterprise Security Management System

Here are some of the features included

Integration with RBH View

Integration with RBH Biometric readers

Mobile App

Web Client

Upgrades within the same version

Support for Blueline Readers

Support for Free UHSC mobile credentials

Support for IOC8

View more RBH access control systems

13 Jun 2018
automatic-systems

AUTOMATIC SYSTEMS

automatic-systems
automatic-systems

CORPORATE PROFILE

AUTOMATIC SYSTEMS is a world leader in the automation of secure entrance control. The company has been designing and manufacturing pedestrian, vehicle and passenger access systems for nearly 50 years.


Founded in 1969, Automatic Systems has developed a unique know-how in the design of high-end obstacles, one-person detection and throughput management making it a brand renowned for the high quality of its products in terms of performance and reliability.

The company is part of the Bolloré group, assurance of a long-term investment strategy and stability for the company.

Our large worldwide business network includes offices and subsidiaries in Belgium, France, Spain, the United Kingdom, The Netherlands, Germany, Canada, China and the United States, a vast international network of distributors and local partners, as well as 5 manufacturing plants (3 in Belgium and 1 in France, Canada) and 3 R&D sites.

  • Every day, more than 90 million people use Automatic Systems’ equipment worldwide.
  • Automatic Systems’ public transportation products are in use in 25 countries.

Automatic Systems strongly believes that a customer is a partner and a supply contract a long-term commitment to service and quality. Our products are designed to suit the purposes and requirements of our clients who can always rely on us.

At Automatic Systems we know that the only way to stay at the forefront of market trends and customer requirements is by innovating and mastering technology. That’s why we invest heavily in Research & Development and have highly advanced resources and expertise for all equipment components (mechanical, electronic, software, etc.).

Operating worldwide, we provide a network of sales, customer service and maintenance programs, technical support, spare parts and training facilities. Our partners have also privileged access to the full documentation of Automatic Systems via our extranet platform, Partnerweb.

For more information, download Automatic Systems Corporate Profile

27 Mar 2018
RBH ACCESS CONTROL

RBH ACCESS CONTROL

RBH ACCESS CONTROL SINCE 1995

RBH ACCESS CONTROL
RBH ACCESS CONTROL

Since 1995 we have been designing and manufacturing Enterprise Access Control and Security Management systems for Canadian and International markets. Through the years we have taken pride in delivering high innovation levels and feature rich products. We continuously invest in research and development, as well as improvements to the manufacturing and distribution aspects of our business.

RBH ACCESS CONTROL
RBH ACCESS CONTROL

Our Products

 

  • Software – from an Enterprise to Small Business solutions, we have packages specifically tailored to a customer’s needs. Utilizing the latest in Microsoft platform technology we deliver responsive and reliable software on the desktop, server and over the web.
  • Hardware – our robust controllers work in the harshest of environments and in a variety of applications all over the globe. Employing open interface protocols we allow for a great selection of available identification devices from proximity, to fingerprint and iris, as well as a myriad of other technologies available on the market today.
  • Identification Devices – in addition to the ability to connect readers and other 3rd party devices, we offer a line of proximity, long range and biometric readers. These bring added value and reliability as well as a great branding opportunity to our partners.

 

 

RBH ACCESS CONTROL Advantages

 

  • Our software is produced by an in-house software development team with a strong emphasis on long term life cycle support and complete control of the code base.
  • Our hardware engineers design our controllers and other devices in close cooperation with the RBH Access Control software development team to ensure that all the important features are embedded directly into our equipment’s firmware, while ensuring robust, “bullet proof” performance out in the field.
  • Our products are designed and manufactured in Canada with strong attention to Quality Control with up to date components and manufacturing techniques.
  • Our components are designed and manufactured under one roof which is the first step to ensuring quality and advanced design.
03 Mar 2018
WHAT IS BIOMETRICS?

WHAT IS MORPHO BIOMETRICS?

 

Biometry literally means "measurement of life". In a broader sense, it designates the quantitative study of living beings. It covers a wide range of applications, including anthropology and medicine. The term biometrics also refers to all processes used to recognize, authenticate and identify persons based on certain physical or behavioral characteristics. THESE CHARACTERISTICS MUST BE: UNIVERSAL so that everybody can use them + UNIQUE to unequivocally distinguish between different persons + INVARIABLE to ensure they can be used throughout a person's lifetime + RECORDABLE so they can be collected and stored + MEASURABLE to enable comparisons

WHAT ARE THE DIFFERENT TYPES OF BIOMETRICS?


Biometrics can be divided into three main categories of characteristics:

BIOLOGICAL DNA blood MORPHOLOGICAL* shape of the hand palms fingerprints vein patterns face iris vein pattern in the retina voice** ear BEHAVIORAL walking** handwritten signatures keyboard strokes

* Morphology: the form and structure of organisms.
** These two biometric types may be considered both morphological and behavioral characteristics.

WHAT IS BIOMETRICS USED FOR?

TO IDENTIFY A PERSON.
Identification answers the question:
“Who is this person?”

Identification (1:N) consists of matching biometric dataamong a large number of persons registered in a database.

Identification (1:N) consists of matching biometric dataamong a large number of persons registered in a database.

TO AUTHENTICATE A PERSON’S IDENTITY.
Authentication answers the question:
“Is this person really Mr. X?” 

Authentication (1:1) consists of verifying that biometric data, for example which is recorded on a passport chip, is the same as for the person holding the passport.

TO AUTHENTICATE A PERSON'S IDENTITY. Authentication answers the question: "Is this person really Mr. X?"  Authentication (1:1) consists of verifying that biometric data, for example which is recorded on a passport chip, is the same as for the person holding the passport.
ARE ALL TYPES OF BIOMETRICS EQUALLY VALID?

Each biometric has its advantages and drawbacks, depending on its degree of variability over time, the quality of capture and how often is used. For example, a person’s voice may be subject to occasional or even permanent changes.

Morpho is specialized in the three major biometric modalities, namely fingerprintface and iris recognition. These three types of biometrics are especially reliable and effective, while being easy to deploy and use.


FINGERPRINT RECOGNITION

Each person has his or her own unique fingerprints – even identical twins have different fingerprints. A fingerprintcomprises about a hundred major features, called minutiae. In most cases, a match between around a dozen minutiae is needed to prove that two fingerprints are identical, and establish a person’s identity to a very high degree of certainty.


FACIAL RECOGNITION

Facial recognition software is capable of identifying an individual according to their facial morphology. Its effectiveness depends on several key factors, including the quality of the captured image, the power of the identification algorithms (which compare, for example, spacing between the eyes), as well as the reliability of the databases used (the larger the database, the greater the probability of identifying a person), etc.


IRIS RECOGNITION

The iris is the colored part of the eye, behind the cornea. It is formed before birth and its appearance changes very little during a person’s life. A person’s right iris is as different from the left iris as it is from another person’s iris. And the irises of identical twins are as different from each other as are the irises of two persons chosen at random. This distinction makes iris recognition a very reliable identificationtechnique, even if the person concerned is wearing glasses or contact lenses.

WHY DO WE USE BIOMETRIC AUTHENTICATION?

The fast-growing number of connected devices (smartphones, tablets, etc.) goes hand in hand with the increasingly critical nature of the applications and content we can find on them. Times have changed, and we live in a world where mobility reigns. However, the typical uses and security behaviors that worked at home on a PC are more difficult to apply on the move, where passwords have reached their limits. But, more than ever, we still have to protect our data, transactions and our identity.

Biometrics is one answer: a simple wave of the hand, pressing a finger on a scanner, or looking at a camera for a second is enough to authenticate our identity.

Biometrics facilities the life of users who are increasingly mobile and connected, offering a simple alternative authentication solution to the traditional password and PIN.

AUTHENTICATION METHODS RANKED BY ORDER OF SECURITY
No access code A simple access code, such as 123 or 000 1 PWD for several accounts, changed once a year / Authentication via a social network (Facebook, etc.) 1 PWD + SMS/OTP 1 PWD + a fingerprint Dual-factor biometric authentication A complex PWD for each account and updated every day

BIOMETRICS: SIMPLER THAN A PASSWORD FOR AUTHENTICATION

Biometrics means you no longer have to use unwieldy passwords. To be effective, a password has to meet four demanding criteria: it has to be changed frequently, be complex, you must not use the same one for different accounts and, above all, it must not be written down! For people on the move, biometric authentication is easier than entering a complex password several times a day.


BIOMETRICS AS A WEAPON AGAINST IDENTITY THEFT

Unlike passwords, biometrics is the only method that establishes a link between our physical and digital identities. This helps us prevent identity theft, enabling us to prove that a person accessing an account or device is really who he or she claims to be. Stealing biometric data without the person’s knowledge, and then reproducing it in a useable form is not as easy as stealing a password and using it remotely.


BIOMETRICS MAKES LARGE-SCALE THEFT VERY DIFFICULT

While it’s relatively easy to access thousands of accounts with stolen passwords in just a few seconds, it’s much harder to hack biometric databases. In addition to gaining access to biometric data, thieves also have to be able to produce fakes for each stolen element, and use them with the appropriate detector – thus eliminating the possibility of any large-scale attack. While the number of PIN codes is limited to the digits between 0000 and 9999, biometric data is unlimited.

 

30 Jan 2018

كاميرات مراقبة | اسعار كاميرات المراقبة

في الوقت الراهن أصبح على الجميع اتخاذ الاحتياطات اللازمة لتأمين منشآتهم ايا كان نوع هذا النشاط سواء كان مسكن او مؤسسة صناعيه او شركة ادارية او مستشفيات ….. إلخ , ومن بين أهم أنظمة التأمين هي كاميرات المراقبة حيث أن لها دور فعال فى تأمين المنشآت فمن خلال كاميرات مراقبة مركبه في منشاتك تستطيع مراقبة منزلك والاطمئنان على اولادك من اى مكان بواسطة هاتفك المحمول ومن خلال كاميرات مراقبة تستطيع مراقبة شركتك ومن خلال كاميرات مراقبة تستطيع  متابعة سير الإنتاج فى منشأتك الصناعية ومن خلال كاميرات مراقبة تستطيع الحماية ضد السرقة والعديد والعديد من الإستخدامات الأخرى

تواصل معنا  على الأرقام التالية

01154000939 – 01154000933 – 0222730200 – 0222730300

أو عبر البريد الإليكترونى 

info@stc-security.com

  

20 Jan 2018

بوابات الكترونية

 والتي تستخدم وتعمل على حماية وتنظيم عملية الدخول والخروج للمنشآت بإختلاف نشاطاتها وبما أننا من  Electronic Gates لدينا بوابات الكترونية

الشركات الرائدة في مجال الانظمة الأمنية وحيث أننا وكلاء لشركة من أكبر شركات البوابات الالكترونية فإننا نوفر لكم بوابات الكترونية صناعة تركية

التركية العالمية والحائزة على العديد من الجوائز فى هذا المجال والتي نفخر بأننا وكيل لها في مصر  ozak من إنتاج شركة

-: فإننا نتحدث عن العديد من الانواع نستعرضها فى هذا المقال electronic gates عند الحديث عن بوابات الكترونية أو

 ( Arm Barrierبوابات الكترونية *

(  Tyre Killer بوابات الكترونية *

FULL HEIGHT TURNSTILES بوابات الكترونية *

( GLASS LINE بوابات الكترونية *

( TURNSTILES FOR REDUCED MOBILITYبوابات الكترونية *

يمكنكم مشاهدة المزيد من بوابات الكترونية والفرق بينها وخطط الأسعار عبر هذا الرابط 

إضغط هنا للدخول الى منتجات بوابات الكترونية

أو التواصل على الارقام التالية للمزيد من الاستفسارات المباشرة 

الإتصال على الأرقام التالية

01154000939 – 01154000933 – 0222730200 – 0222730300

أو عبر البريد الإليكترونى 

info@stc-security.com

28 Nov 2017

عروض خاصة على اجهزة الحضور والانصراف

بمناسبة السنة الجديدة ستار تكنولوجي بتقدم لعملائها الكرام أحدث عروض التوفير على أجهزة الحضور والإنصراف الكورية الحاصلة على أعلى شهادات الجودة العالمية 

 

اجهزة حضور وانصراف

 

 

اجهزة حضور وانصراف

 


للإستفسارات أو لطلب المنتج

الإتصال على الأرقام التالية

01154000939 – 01154000933 – 0222730200 – 0222730300

أو عبر البريد الإليكترونى

info@stc-security.com

أو من خلال هذا النموذج

Your Name *
Your Email address *
The Subject
Your Phone number *
Message *

Fields marked with a * are required