MorphoAccess SIGMA Extreme Reader
Product Code: SIGMA Extreme Prox
Key Features
- RWithstands strong impacts & high resistance to vandalism (IK09 rated)
- RImpermeable to dust and water (IP65 sealed enclosure)
- RTime & Attendance functions
- R300000 templates, 250000 IDs in authorized user list, 1 Million logs
- RProx®, iClass® or MIFARE®/DESFire®/NFC contactless card reader as an option
- RFake finger and face detection, duress finger, timed anti-passback
About the product
Rugged and powerful, the MorphoAccess® SIGMA Extreme is a remarkable addition to the SIGMA Family of fingerprint readers.
Based on the same platform as other SIGMA devices, the outdoor MA SIGMA Extreme is specifically designed to operate in difficult environments (dust, salt mist, tough manual workplaces, etc.) and in harsh weather conditions.
The MA SIGMA Extreme, including its large capacitive touchscreen, is resistant to vandalism and can withstand the impact of a 500g (1 lb.) steel ball dropped from a height of 2 meters (6.5 ft.). The product enclosure, front and rear, is sealed and impermeable to dust and water.
Installation
The MorphoAccess Sigma Extreme Fingerprint reader can be seamlessly connected to our range of top-of-the-line controllers, including the SDC-650 Multiple Door Controller (via OSDP), the SDC-620 Wiegand Door Controller (via Wiegand/OSDP), and the SDC-320 Wiegand Two Door Controller (via Wiegand). In addition, it can be connected to the SEB-722 remote IO expansion board (via Wiegand).
Each reader must be connected to the network (Ethernet) to allow for template management (fingerprint enrolment, editing and removal) using our native SACS interface.
Each reader must be connected to the network (Ethernet) to allow for template management (fingerprint enrolment, editing and removal) using our native SACS interface.
Operation
When a user presents their finger at the reader, the reader transmits the corresponding user identifier number to the door controller for analysis. The controller then determines the access permission, based on predetermined access rules, which is subsequently conveyed to the reader. The reader, in turn, provides the appropriate feedback to the user through the use of its LCD display and buzzer signals, reflecting the determined access permission status.