SlideShare a Scribd company logo
1 of 45
M2SYS Technology ©M2SYS Technology. All rights reserved.
[object Object],[object Object],[object Object],[object Object],[object Object],Agenda ©M2SYS Technology. All rights reserved.
M2SYS is a recognized industry leader in biometric identity management technology.  Anchored by our innovative, patent-pending solution called Bio-Plugin™, we deliver fully functional, turn-key biometric recognition software that instantly integrates into third party programs, in many cases with no additional development or system upgrades required. We also offer several stand-alone, enterprise applications and desktop security products that leverage our biometrics engine to protect assets, lower costs, and reduce risk. Our biometric software solutions are accelerating the growth of biometric technology adoption in the global marketplace.  M2SYS takes great pride in delivering leading-edge technology and exceptional service. We operate in a number of vertical markets, including law enforcement, education, fitness and leisure, POS, time and attendance, banking, child care, transportation security, and health care. M2SYS has hundreds of software companies all over the world that have integrated our technology and thousands of end user customers.  Brief M2SYS Overview M2SYS Selected for its Innovative  Bio-Plugin Technology ©M2SYS Technology. All rights reserved.
“ The combination of M2SYS’s Bio-Plugin(TM) technology and customer service practices has earned it an outstanding reputation in the biometrics industry,” notes Frost & Sullivan Research Analyst Imran Khan. “The company’s innovative and unique technology has had a discernable effect on the growth of biometric technology adoption in the global marketplace.” Industry Awards ©M2SYS Technology. All rights reserved. “ Bio-Plugin from M2SYS is similar to a software development kit (SDK) with the exception that most of the work is done for the developer in advance. Bio-Plugin allows software application developers to include biometric access control within their applications with the addition of some simple code that communicates with the  Bio-Plugin client-side software through an ActiveX bridge. Because all of the biometric work is being done by the client and server sides of the product, all the application needs to do is communicate. “
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Brief M2SYS Overview ©M2SYS Technology. All rights reserved.
[object Object],[object Object],[object Object],[object Object],[object Object],Agenda ©M2SYS Technology. All rights reserved.
“ Given the potential harm that can result from new and more dangerous forms of attacks, both physical and virtual, organizations can no longer afford to wait until they are attacked to defend themselves,” said Sid Pearl, global director, Risk Intelligence Solutions Management, Unisys. “They will begin to more closely monitor behaviors and identities in an effort to predict and prevent attacks before they happen.”  ----  Study by Unisys on Biometrics Acceptance in Commercial Marketplace In 2009, Biometric companies generated 3,422.3 million in worldwide revenue, according to market research firm International Biometric Group. This time-tested technique has gained popularity because it is the most mature biometric system. The global biometrics industry is forecast to more than triple its revenue to 9,368.9 billion in 2014, according to the International Biometric Group.  ----  International Biometric Group New analysis from Frost & Sullivan (www.autoid.frost.com), EMEA Biometrics Market, finds that the market earned euro 216.1 million in 2008 and is anticipated to reach euro 1,058.0 million by 2015, growing at a compound annual growth rate (CAGR) of 25.5 per cent from 2008 to 2015. Technologies covered include: non-AFIS, face recognition, iris recognition, hand geometry as well as voice and signature verification.   -----  Frost & Sullivan Market Opportunity ©M2SYS Technology. All rights reserved.
[object Object],[object Object],[object Object],[object Object],Find out how M2SYS can get you there… The Bottom Line ©M2SYS Technology. All rights reserved.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Value Scenario ©M2SYS Technology. All rights reserved.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Opportunity ©M2SYS Technology. All rights reserved.
[object Object],[object Object],[object Object],[object Object],[object Object],Agenda ©M2SYS Technology. All rights reserved.
Products M2SYS has developed several CORE TECHNOLOGY software products based on its Bio-Plugin™ engine. Our BUSINESS SOLUTIONS target larger end users.  These products satisfy a significant and continuously growing demand for off-the-shelf biometric technology in various markets.  ©M2SYS Technology. All rights reserved.
Products ©M2SYS Technology. All rights reserved.
Products ©M2SYS Technology. All rights reserved.
CORE TECHNOLOGY - PRODUCT LINE ©M2SYS Technology. All rights reserved.
Scalable, turn-key biometric recognition system that seamlessly integrates with Windows based applications with hardly any development effort.  Eliminates the hassle and headache associated with complex integration.  Supports Citrix and MS Terminal Services.  CORE TECHNOLOGY: Bio-Plugin Appserver ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],©M2SYS Technology. All rights reserved.
Version of Bio-Plugin designed for integration into web-based software.  The Web server architecture enables integrators to communicate directly to the Bio-Plugin hybrid server for recognition through a Web Services interface.  This results in airtight security and an even more simplified integration process. CORE TECHNOLOGY: Bio-Plugin Webserver ,[object Object],[object Object],[object Object],[object Object],©M2SYS Technology. All rights reserved.
 
 
Complete Biometric recognition system that can be instantly integrated with a client’s existing third party software package.  No development work required.  Can be used to complement or replace any external barcode or magstripe device with biometric identification, substitute recognition for username and password, store biometric data on smart card, etc.  CORE TECHNOLOGY: Bio-SnapON ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],©M2SYS Technology. All rights reserved.
Highly scalable biometric recognition system that uses distributed node balancing for fast, 1:N identification of very large databases.  Has the ability to compare 30,000 prints/sec/server node.  Architecture easily scales by adding more nodes as database grows. CORE TECHNOLOGY: Parallel Server ,[object Object],[object Object],[object Object],[object Object],[object Object],©M2SYS Technology. All rights reserved.
BUSINESS SOLUTIONS - PRODUCT LINE ©M2SYS Technology. All rights reserved.
Enterprise biometric network logon solution that interfaces with MS Active Directory.  Uses active directory to manage recognized data on the server and provides this data to clients connected to the network.  BUSINESS SOLUTIONS: Enterprise Biometrics Suite ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],©M2SYS Technology. All rights reserved.
Multi-functional biometric software for secure PC logon, local file encryption, password management, application launch protection, and screen saver lock.  Users install from CD-ROM to secure all information on the PC.  Package includes an M2-S1 swipe fingerprint reader. BUSINESS SOLUTIONS: Desktop Biometrics Suite ,[object Object],[object Object],[object Object],[object Object],[object Object],©M2SYS Technology. All rights reserved.
PC or web-based enterprise biometric tracking, personnel authentication, and secure document storage software.  Can be used at schools, military bases, member-based businesses, government facilities, check cashing providers, etc. to identify individuals in high-security environments where protection of critical data is essential. BUSINESS SOLUTIONS: Bio-Tracker ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],©M2SYS Technology. All rights reserved.
A PC or web-based employee time and attendance data capture utility.  Employee profiles can be created and stored along with a digital photo and their biometric signature.  Clock in and out transactions are accurately retained and can be exported to any back-end workforce management, accounting, or payroll application for streamlined data flow. BUSINESS SOLUTIONS: Bio-TimeClock ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],©M2SYS Technology. All rights reserved.
BUSINESS SOLUTIONS: TimeShield ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Technical Specifications Capacity  :Templates: up to 2500 Transactions : 50000 Dimensions : Length: 7.90 inch; Width: 5.35 inch; Depth: 1.96” Display : 2x16 Character LCD ; RS232 /RS485 /TCP/IP Identification Mode:  Up to 2500  Templates Identification Time:  <= 2 Seconds  Verification Time:  1 second  Enrollment Time:  < 5 seconds  False Acceptance Rate:  <= 0.001%  False Rejection Rate:  <= 1% Environment: Operating Temperature: 2°F - 105°F
HARDWARE – PRODUCT LINE
Hardware: M2-S™ Fingerprint Reader ©M2SYS Technology. All rights reserved. M2-S™ Technical Specifications Category  Description Connection  5’ 10” USB cable   Type  Optical  Surface  Silicone Layer Calibration    N/A    (device self-calibrates upon connection with USB port)   Image quality    512 dpi   Image format    JPEG, GIF, BITMAP, RAW, PNG    (images can be saved in any format requested by host software) Area for fingerprint scan  0.58”  (nominal width at center)  0.71”  (nominal length)   Operating System    Windows XP,vista, winsows 7,2000, Me, NT 4.0  Warranty    1 year mechanical defect   Dimensions    H: 5.5” W: 2.75” D: 1.00”   Weight   7 oz.   Image Data    8-bit grayscale (256 levels of gray)   Compatibility    USB specifications 1.0, 1.1, 2.0
Hardware: M2-EasyScan™   Fingerprint Reader Interface USB 2.0 Type Optical Size 40 mm (L) x 27mm (W) x 73mm (H)  Calibration Device self-calibrates Resolution 500 dpi Operating System  Windows XP, 2000, Me, Server 2003 Warranty  2 year mechanical defect Weight 100g (no stand) Operating Temperature  0°C ~ +40°C   Certifications  MIC, CE, FCC, WHQL, RoHS compliance Technical Specifications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Features and Benefits ©M2SYS Technology. All rights reserved.
Hardware: M2-FV™ Finger Vein Reader Capture System  Infrared LED + Camera  Interface  USB 2.0  Dimensions  59 (W) x 82 (D) x 74 (H) mm  Weight  96g  Environmental Conditions  Ambient Temperature Humidity 5 – 35 deg. C 20% – 80% (No Condensation)  Power  DC5V +/-5%<500mA (Power from USB bus)  USB Cable  1.8m Technical Specifications ,[object Object],[object Object],[object Object],[object Object],Features and Benefits ©M2SYS Technology. All rights reserved.
Hardware: M2-S1™ Fingerprint Reader ©M2SYS Technology. All rights reserved. M2-S1™ Technical Specifications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometric Access Control System ©M2SYS Technology. All rights reserved. Biometric Access Control M2- SecureLock TM  Access Control M2- Easy Access Control TM  Biometric Reader M2- FV Access TM  Finger Vein Reader
Biometric Access Control System: M2-SecureLockTM ©M2SYS Technology. All rights reserved. Technical Specifications Identification  : 1:N  Identification Time : <1.5 seconds  False Rejection Rate : FRR less than 1%  False Acceptance Rate  : FAR less than 0.0001%  Display  :OLED  Color  : Silver  Maximum Capacity  : 500 fingerprints/ID numbers Transaction Storage : 30,000  Communication Mode : RS232  Password Storage  :Yes, up to 100  Password Length : 6-10 characters  Operating Temperature : 0°C ~ 80°C  Operating Humidity : 20-80%, non-condensing  Certification : CE, FCC, UL, RoHS
Biometric Access Control System: M2-FV AccessTM  ©M2SYS Technology. All rights reserved. Technical Specifications  Identification : 1:N, 1:1  False Rejection Rate : FRR less than 0.01%  False Acceptance Rate :  FAR less than  0.0001%  Failure to Enroll  FTE  :less than 0.03%  Maximum 1:N Capacity :Up to 1,000 records  Maximum 1:1 Capacity  : Unlimited  Customized Messages : Can be unique to each  user  Wi-Fi : Integrated on board  Operating Temperature :  -20°C ~ 80°C
Biometric Access Control System: M2-Easy Access TM ©M2SYS Technology. All rights reserved. Technical Specifications Identification  : 1:1 or 1:N  Maximum Capacity : 1500  Identification Time  :1:1 – 0.5 seconds    1:N – 2 seconds (based on full  capacity of 1500) USB  :Mini-USB 2.0 Port  LCD Panel : 2 line, 16 characters per line  Keypad  :4x4 keypad with 4 function ke Audio Visual Indicator : RED LED (Access Denied)/   GREEN LED(Access Accepted)  False Acceptance Rate : FAR < 0.0001%  False Reject Rate :FRR < 1%  Dimensions  :140mm x 117 mm x 38mm  Housing Material  :ABS  Power Requirement  :12V DC, 400mA  Ethernet  :10/100M  Wiegand I/O  :Any Bit  Operating Temperature :0°C ~ 45°C  Operating Humidity :20-80%, non-condensing
M2-Express Pocket PC: M2-Express TM   ©M2SYS Technology. All rights reserved. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Agenda ©M2SYS Technology. All rights reserved.
Case Study: Bio-Plugin Appserver (Integrator) Client:  Kodak Dental Systems   Challenge: Product:  Dental Practice Management Software ,[object Object],[object Object],[object Object],Solution: ,[object Object],Benefits: ,[object Object],[object Object],[object Object],©M2SYS Technology. All rights reserved.
Case Study: Bio-Plugin Webserver (End User) Client:  Top 5 Global Defense Contractor   Challenge: Product:  Web-Based Manufacturing Control System ,[object Object],[object Object],[object Object],Solution: ,[object Object],Benefits: ,[object Object],[object Object],[object Object],©M2SYS Technology. All rights reserved.
Case Study: Bio-SnapON Client:  School   Challenge: Product:  Web-Based Lunch Line POS System ,[object Object],[object Object],[object Object],Solution: ,[object Object],Benefits: ,[object Object],[object Object],[object Object],[object Object],©M2SYS Technology. All rights reserved.
Case Study: Bio-Tracker Client:  Military Base   Challenge: Use:  Secure Checkpoint Identification ,[object Object],[object Object],[object Object],[object Object],Solution: ,[object Object],Benefits: ,[object Object],[object Object],[object Object],©M2SYS Technology. All rights reserved.
Case Study: Enterprise Biometrics Suite Client:  Fortune 500 Company   Challenge: Product:  Active Directory Network Login ,[object Object],[object Object],[object Object],Solution: ,[object Object],Benefits: ,[object Object],[object Object],[object Object],[object Object],©M2SYS Technology. All rights reserved.
[object Object],[object Object],[object Object],[object Object],[object Object],Agenda ©M2SYS Technology. All rights reserved.
Contact Info M2SYS  Technology 1050 Crown Pointe Pkwy STE 470 Atlanta, GA  30338 www.m2sys.com Contact: Nazmul Hossain P: +1(770) 393-0986 ext 42 Cell: +88 01717 552939 F: (678) 559-0219 [email_address]   Please contact us with any questions or for more information on establishing a reseller partnership: ©M2SYS Technology. All rights reserved.

More Related Content

What's hot

Symantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitSymantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitLluis Altes
 
The UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityThe UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityAegify Inc.
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Nicole Pellegrino
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyUbisecure
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airportsRexcy
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...Ubisecure
 
IoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnlineIoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnlineFranceschiniLaura
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problemBilcareltd
 
Risk &amp; compliance magazine compressed
Risk &amp; compliance magazine compressed Risk &amp; compliance magazine compressed
Risk &amp; compliance magazine compressed Mirror Review
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.Merry D'souza
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)Peter Bihr
 
Near Field Communications Technology Overview
Near Field Communications Technology OverviewNear Field Communications Technology Overview
Near Field Communications Technology OverviewChris Anderson
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Investorideas.com
 

What's hot (17)

The 10 most trusted risk management solution providers 2019
The 10 most trusted risk management solution providers 2019The 10 most trusted risk management solution providers 2019
The 10 most trusted risk management solution providers 2019
 
Fortifier case studies
Fortifier case studiesFortifier case studies
Fortifier case studies
 
Symantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitSymantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company split
 
The UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityThe UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support Cybersecurity
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategy
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
 
IoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnlineIoT - RTD WHITE PAPER SquaredOnline
IoT - RTD WHITE PAPER SquaredOnline
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problem
 
Risk &amp; compliance magazine compressed
Risk &amp; compliance magazine compressed Risk &amp; compliance magazine compressed
Risk &amp; compliance magazine compressed
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)
 
Near Field Communications Technology Overview
Near Field Communications Technology OverviewNear Field Communications Technology Overview
Near Field Communications Technology Overview
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
 

Viewers also liked

Legal Crash Test 2012 - Алексей Соломатин Smartag TV
Legal Crash Test 2012 - Алексей Соломатин Smartag TVLegal Crash Test 2012 - Алексей Соломатин Smartag TV
Legal Crash Test 2012 - Алексей Соломатин Smartag TVlegalcampspb
 
Onlizer IoT Foundation
Onlizer IoT FoundationOnlizer IoT Foundation
Onlizer IoT FoundationAndriy Deren'
 
evvnt Reseller Partnership Media Pack
evvnt Reseller Partnership Media Packevvnt Reseller Partnership Media Pack
evvnt Reseller Partnership Media PackRichard Green
 
Dizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion, Inc.
 
FIWARE IoT Proposal & Community
FIWARE IoT Proposal & CommunityFIWARE IoT Proposal & Community
FIWARE IoT Proposal & CommunityFIWARE
 
Hl final partnership proposal (the final version)
Hl final partnership proposal (the final version)Hl final partnership proposal (the final version)
Hl final partnership proposal (the final version)Jinwoo Kim
 
Partnership: Value Added Resseller (VAR) model
Partnership: Value Added Resseller (VAR) modelPartnership: Value Added Resseller (VAR) model
Partnership: Value Added Resseller (VAR) modelSolusoft
 
Team Tigress - Sailing Partnership
Team Tigress - Sailing PartnershipTeam Tigress - Sailing Partnership
Team Tigress - Sailing PartnershipAlexander Gray
 
Virtual Reality Partnership Proposal (June 2014) Next Galaxy Corporation & Vi...
Virtual Reality Partnership Proposal (June 2014) Next Galaxy Corporation & Vi...Virtual Reality Partnership Proposal (June 2014) Next Galaxy Corporation & Vi...
Virtual Reality Partnership Proposal (June 2014) Next Galaxy Corporation & Vi...Charlotte Mills
 
Stephen Jelley Patnership Proposal
Stephen Jelley Patnership ProposalStephen Jelley Patnership Proposal
Stephen Jelley Patnership Proposaldominichowkins
 
Nfmt vegas14 how to specify commercial flooring
Nfmt vegas14 how to specify commercial flooringNfmt vegas14 how to specify commercial flooring
Nfmt vegas14 how to specify commercial flooringLew Migliore
 
[SIP 2015] Hardware Proposal: Ads view counter for AdsBox
[SIP 2015] Hardware Proposal: Ads view counter for AdsBox[SIP 2015] Hardware Proposal: Ads view counter for AdsBox
[SIP 2015] Hardware Proposal: Ads view counter for AdsBoxSilicon Straits
 
Sendloop Whitelabel
Sendloop WhitelabelSendloop Whitelabel
Sendloop WhitelabelCem Hurturk
 
Partnership Proposal
Partnership ProposalPartnership Proposal
Partnership Proposalmckenzta
 
TSF | Solar on Schools Presentation
TSF | Solar on Schools PresentationTSF | Solar on Schools Presentation
TSF | Solar on Schools PresentationThe Solar Foundation
 
Hospitality ruckus wireless
Hospitality ruckus wirelessHospitality ruckus wireless
Hospitality ruckus wirelessayman khder
 

Viewers also liked (19)

Star Floors Presentation
Star Floors PresentationStar Floors Presentation
Star Floors Presentation
 
SendGrid
SendGridSendGrid
SendGrid
 
Legal Crash Test 2012 - Алексей Соломатин Smartag TV
Legal Crash Test 2012 - Алексей Соломатин Smartag TVLegal Crash Test 2012 - Алексей Соломатин Smartag TV
Legal Crash Test 2012 - Алексей Соломатин Smartag TV
 
Onlizer IoT Foundation
Onlizer IoT FoundationOnlizer IoT Foundation
Onlizer IoT Foundation
 
evvnt Reseller Partnership Media Pack
evvnt Reseller Partnership Media Packevvnt Reseller Partnership Media Pack
evvnt Reseller Partnership Media Pack
 
Dizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the water
 
FIWARE IoT Proposal & Community
FIWARE IoT Proposal & CommunityFIWARE IoT Proposal & Community
FIWARE IoT Proposal & Community
 
Hl final partnership proposal (the final version)
Hl final partnership proposal (the final version)Hl final partnership proposal (the final version)
Hl final partnership proposal (the final version)
 
NGCI
NGCINGCI
NGCI
 
Partnership: Value Added Resseller (VAR) model
Partnership: Value Added Resseller (VAR) modelPartnership: Value Added Resseller (VAR) model
Partnership: Value Added Resseller (VAR) model
 
Team Tigress - Sailing Partnership
Team Tigress - Sailing PartnershipTeam Tigress - Sailing Partnership
Team Tigress - Sailing Partnership
 
Virtual Reality Partnership Proposal (June 2014) Next Galaxy Corporation & Vi...
Virtual Reality Partnership Proposal (June 2014) Next Galaxy Corporation & Vi...Virtual Reality Partnership Proposal (June 2014) Next Galaxy Corporation & Vi...
Virtual Reality Partnership Proposal (June 2014) Next Galaxy Corporation & Vi...
 
Stephen Jelley Patnership Proposal
Stephen Jelley Patnership ProposalStephen Jelley Patnership Proposal
Stephen Jelley Patnership Proposal
 
Nfmt vegas14 how to specify commercial flooring
Nfmt vegas14 how to specify commercial flooringNfmt vegas14 how to specify commercial flooring
Nfmt vegas14 how to specify commercial flooring
 
[SIP 2015] Hardware Proposal: Ads view counter for AdsBox
[SIP 2015] Hardware Proposal: Ads view counter for AdsBox[SIP 2015] Hardware Proposal: Ads view counter for AdsBox
[SIP 2015] Hardware Proposal: Ads view counter for AdsBox
 
Sendloop Whitelabel
Sendloop WhitelabelSendloop Whitelabel
Sendloop Whitelabel
 
Partnership Proposal
Partnership ProposalPartnership Proposal
Partnership Proposal
 
TSF | Solar on Schools Presentation
TSF | Solar on Schools PresentationTSF | Solar on Schools Presentation
TSF | Solar on Schools Presentation
 
Hospitality ruckus wireless
Hospitality ruckus wirelessHospitality ruckus wireless
Hospitality ruckus wireless
 

Similar to M2SYS Partnership Program 2010

The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019Merry D'souza
 
Transforming The Insurance Industry How Liferay DXP Is Revolutionizing Digita...
Transforming The Insurance Industry How Liferay DXP Is Revolutionizing Digita...Transforming The Insurance Industry How Liferay DXP Is Revolutionizing Digita...
Transforming The Insurance Industry How Liferay DXP Is Revolutionizing Digita...arenakelly
 
M2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdfM2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdfJuan Ben
 
The Leading Bio metric Companies of India.pdf
The Leading Bio metric Companies of India.pdfThe Leading Bio metric Companies of India.pdf
The Leading Bio metric Companies of India.pdfinsightssuccess2
 
Connected homes - Create a safer, healthier and greener world for your custom...
Connected homes - Create a safer, healthier and greener world for your custom...Connected homes - Create a safer, healthier and greener world for your custom...
Connected homes - Create a safer, healthier and greener world for your custom...Mindtree Ltd.
 
Reduced revenue leakage stemming from piracy for a Fortune 500 software major.
Reduced revenue leakage stemming from piracy for a Fortune 500 software major.Reduced revenue leakage stemming from piracy for a Fortune 500 software major.
Reduced revenue leakage stemming from piracy for a Fortune 500 software major.Mindtree Ltd.
 
Aiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimiLtd
 
CoverGo Limited - Insurtech Innovation Award 2023
CoverGo Limited - Insurtech Innovation Award 2023CoverGo Limited - Insurtech Innovation Award 2023
CoverGo Limited - Insurtech Innovation Award 2023The Digital Insurer
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfinsightssuccess2
 
Monetizing the Internet of Things: Creating a Connected Customer Experience
Monetizing the Internet of Things: Creating a Connected Customer ExperienceMonetizing the Internet of Things: Creating a Connected Customer Experience
Monetizing the Internet of Things: Creating a Connected Customer ExperienceZuora, Inc.
 
TBytes Agile & AI Operations
TBytes Agile & AI OperationsTBytes Agile & AI Operations
TBytes Agile & AI OperationsEGBG Services
 
CoverGo - InsurTech Innovation Award 2022
CoverGo - InsurTech Innovation Award 2022CoverGo - InsurTech Innovation Award 2022
CoverGo - InsurTech Innovation Award 2022The Digital Insurer
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Conor Bronsdon
 
Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?The Digital Insurer
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023The Digital Insurer
 
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...Enterprise Management Associates
 

Similar to M2SYS Partnership Program 2010 (20)

The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019
 
Transforming The Insurance Industry How Liferay DXP Is Revolutionizing Digita...
Transforming The Insurance Industry How Liferay DXP Is Revolutionizing Digita...Transforming The Insurance Industry How Liferay DXP Is Revolutionizing Digita...
Transforming The Insurance Industry How Liferay DXP Is Revolutionizing Digita...
 
M2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdfM2SYS Biometric Technology Solutions Suite.pdf
M2SYS Biometric Technology Solutions Suite.pdf
 
The Leading Bio metric Companies of India.pdf
The Leading Bio metric Companies of India.pdfThe Leading Bio metric Companies of India.pdf
The Leading Bio metric Companies of India.pdf
 
Connected homes - Create a safer, healthier and greener world for your custom...
Connected homes - Create a safer, healthier and greener world for your custom...Connected homes - Create a safer, healthier and greener world for your custom...
Connected homes - Create a safer, healthier and greener world for your custom...
 
Reduced revenue leakage stemming from piracy for a Fortune 500 software major.
Reduced revenue leakage stemming from piracy for a Fortune 500 software major.Reduced revenue leakage stemming from piracy for a Fortune 500 software major.
Reduced revenue leakage stemming from piracy for a Fortune 500 software major.
 
Aiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast BriefingAiimi Insurance Breakfast Briefing
Aiimi Insurance Breakfast Briefing
 
CoverGo Limited - Insurtech Innovation Award 2023
CoverGo Limited - Insurtech Innovation Award 2023CoverGo Limited - Insurtech Innovation Award 2023
CoverGo Limited - Insurtech Innovation Award 2023
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdf
 
Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019
 
Monetizing the Internet of Things: Creating a Connected Customer Experience
Monetizing the Internet of Things: Creating a Connected Customer ExperienceMonetizing the Internet of Things: Creating a Connected Customer Experience
Monetizing the Internet of Things: Creating a Connected Customer Experience
 
TBytes Agile & AI Operations
TBytes Agile & AI OperationsTBytes Agile & AI Operations
TBytes Agile & AI Operations
 
CoverGo - InsurTech Innovation Award 2022
CoverGo - InsurTech Innovation Award 2022CoverGo - InsurTech Innovation Award 2022
CoverGo - InsurTech Innovation Award 2022
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...
 
The 10 most trusted biometric companies
The 10 most trusted biometric companiesThe 10 most trusted biometric companies
The 10 most trusted biometric companies
 
Digitaltech International Presentation
Digitaltech International PresentationDigitaltech International Presentation
Digitaltech International Presentation
 
Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?
 
IOT in Bangladesh
IOT in BangladeshIOT in Bangladesh
IOT in Bangladesh
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023
 
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...Responsible Consumer Identity and Access Management (CIAM): Architecting High...
Responsible Consumer Identity and Access Management (CIAM): Architecting High...
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

M2SYS Partnership Program 2010

  • 1. M2SYS Technology ©M2SYS Technology. All rights reserved.
  • 2.
  • 3. M2SYS is a recognized industry leader in biometric identity management technology. Anchored by our innovative, patent-pending solution called Bio-Plugin™, we deliver fully functional, turn-key biometric recognition software that instantly integrates into third party programs, in many cases with no additional development or system upgrades required. We also offer several stand-alone, enterprise applications and desktop security products that leverage our biometrics engine to protect assets, lower costs, and reduce risk. Our biometric software solutions are accelerating the growth of biometric technology adoption in the global marketplace. M2SYS takes great pride in delivering leading-edge technology and exceptional service. We operate in a number of vertical markets, including law enforcement, education, fitness and leisure, POS, time and attendance, banking, child care, transportation security, and health care. M2SYS has hundreds of software companies all over the world that have integrated our technology and thousands of end user customers. Brief M2SYS Overview M2SYS Selected for its Innovative Bio-Plugin Technology ©M2SYS Technology. All rights reserved.
  • 4. “ The combination of M2SYS’s Bio-Plugin(TM) technology and customer service practices has earned it an outstanding reputation in the biometrics industry,” notes Frost & Sullivan Research Analyst Imran Khan. “The company’s innovative and unique technology has had a discernable effect on the growth of biometric technology adoption in the global marketplace.” Industry Awards ©M2SYS Technology. All rights reserved. “ Bio-Plugin from M2SYS is similar to a software development kit (SDK) with the exception that most of the work is done for the developer in advance. Bio-Plugin allows software application developers to include biometric access control within their applications with the addition of some simple code that communicates with the  Bio-Plugin client-side software through an ActiveX bridge. Because all of the biometric work is being done by the client and server sides of the product, all the application needs to do is communicate. “
  • 5.
  • 6.
  • 7. “ Given the potential harm that can result from new and more dangerous forms of attacks, both physical and virtual, organizations can no longer afford to wait until they are attacked to defend themselves,” said Sid Pearl, global director, Risk Intelligence Solutions Management, Unisys. “They will begin to more closely monitor behaviors and identities in an effort to predict and prevent attacks before they happen.” ---- Study by Unisys on Biometrics Acceptance in Commercial Marketplace In 2009, Biometric companies generated 3,422.3 million in worldwide revenue, according to market research firm International Biometric Group. This time-tested technique has gained popularity because it is the most mature biometric system. The global biometrics industry is forecast to more than triple its revenue to 9,368.9 billion in 2014, according to the International Biometric Group. ---- International Biometric Group New analysis from Frost & Sullivan (www.autoid.frost.com), EMEA Biometrics Market, finds that the market earned euro 216.1 million in 2008 and is anticipated to reach euro 1,058.0 million by 2015, growing at a compound annual growth rate (CAGR) of 25.5 per cent from 2008 to 2015. Technologies covered include: non-AFIS, face recognition, iris recognition, hand geometry as well as voice and signature verification. ----- Frost & Sullivan Market Opportunity ©M2SYS Technology. All rights reserved.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Products M2SYS has developed several CORE TECHNOLOGY software products based on its Bio-Plugin™ engine. Our BUSINESS SOLUTIONS target larger end users. These products satisfy a significant and continuously growing demand for off-the-shelf biometric technology in various markets. ©M2SYS Technology. All rights reserved.
  • 13. Products ©M2SYS Technology. All rights reserved.
  • 14. Products ©M2SYS Technology. All rights reserved.
  • 15. CORE TECHNOLOGY - PRODUCT LINE ©M2SYS Technology. All rights reserved.
  • 16.
  • 17.
  • 18.  
  • 19.  
  • 20.
  • 21.
  • 22. BUSINESS SOLUTIONS - PRODUCT LINE ©M2SYS Technology. All rights reserved.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29. Hardware: M2-S™ Fingerprint Reader ©M2SYS Technology. All rights reserved. M2-S™ Technical Specifications Category Description Connection 5’ 10” USB cable Type Optical Surface Silicone Layer Calibration N/A (device self-calibrates upon connection with USB port) Image quality 512 dpi Image format JPEG, GIF, BITMAP, RAW, PNG (images can be saved in any format requested by host software) Area for fingerprint scan 0.58” (nominal width at center) 0.71” (nominal length) Operating System Windows XP,vista, winsows 7,2000, Me, NT 4.0 Warranty 1 year mechanical defect Dimensions H: 5.5” W: 2.75” D: 1.00” Weight 7 oz. Image Data 8-bit grayscale (256 levels of gray) Compatibility USB specifications 1.0, 1.1, 2.0
  • 30.
  • 31.
  • 32.
  • 33. Biometric Access Control System ©M2SYS Technology. All rights reserved. Biometric Access Control M2- SecureLock TM Access Control M2- Easy Access Control TM Biometric Reader M2- FV Access TM Finger Vein Reader
  • 34. Biometric Access Control System: M2-SecureLockTM ©M2SYS Technology. All rights reserved. Technical Specifications Identification : 1:N Identification Time : <1.5 seconds False Rejection Rate : FRR less than 1% False Acceptance Rate : FAR less than 0.0001% Display :OLED Color : Silver Maximum Capacity : 500 fingerprints/ID numbers Transaction Storage : 30,000 Communication Mode : RS232 Password Storage :Yes, up to 100 Password Length : 6-10 characters Operating Temperature : 0°C ~ 80°C Operating Humidity : 20-80%, non-condensing Certification : CE, FCC, UL, RoHS
  • 35. Biometric Access Control System: M2-FV AccessTM ©M2SYS Technology. All rights reserved. Technical Specifications Identification : 1:N, 1:1 False Rejection Rate : FRR less than 0.01% False Acceptance Rate : FAR less than 0.0001% Failure to Enroll FTE :less than 0.03% Maximum 1:N Capacity :Up to 1,000 records Maximum 1:1 Capacity : Unlimited Customized Messages : Can be unique to each user Wi-Fi : Integrated on board Operating Temperature : -20°C ~ 80°C
  • 36. Biometric Access Control System: M2-Easy Access TM ©M2SYS Technology. All rights reserved. Technical Specifications Identification : 1:1 or 1:N Maximum Capacity : 1500 Identification Time :1:1 – 0.5 seconds 1:N – 2 seconds (based on full capacity of 1500) USB :Mini-USB 2.0 Port LCD Panel : 2 line, 16 characters per line Keypad :4x4 keypad with 4 function ke Audio Visual Indicator : RED LED (Access Denied)/ GREEN LED(Access Accepted) False Acceptance Rate : FAR < 0.0001% False Reject Rate :FRR < 1% Dimensions :140mm x 117 mm x 38mm Housing Material :ABS Power Requirement :12V DC, 400mA Ethernet :10/100M Wiegand I/O :Any Bit Operating Temperature :0°C ~ 45°C Operating Humidity :20-80%, non-condensing
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. Contact Info M2SYS Technology 1050 Crown Pointe Pkwy STE 470 Atlanta, GA 30338 www.m2sys.com Contact: Nazmul Hossain P: +1(770) 393-0986 ext 42 Cell: +88 01717 552939 F: (678) 559-0219 [email_address] Please contact us with any questions or for more information on establishing a reseller partnership: ©M2SYS Technology. All rights reserved.