Palm-ID Pro.
within justice, government, laboratories, logistics and critical infrastructure.

Clear LED feedback
High level of security
Compatible
Easy to install





Palm-ID Pro parts
The controller contains the database in which the authorised persons and their unique biometric identifiers are stored. The controller compares the vein pattern of each scanned palm with the encrypted data in the database in real time.
Palm-ID Pro accessories
Various accessories are available for the Palm-ID Pro. Among other things, there is a Palm-ID Pro registration kit. This tabletop model is easy to transport so you can register people at multiple locations. You capture the vein pattern in the user’s palm once. The pattern is not saved as an image: it is immediately encoded and stored digitally as a registered template.
Installation and implementation
Installation and implementation of Palm-ID Pro is carried out by recognised system integrators and installers with appropriate knowledge of access control systems and security. If you would like more information or to become an installer, please contact us.

Recent articles
The 5 Most Frequently Asked Questions About the Cyber Resilience Act (CRA) in Biometric Access Control
The impact of the Cyber Resilience Act is still often underestimated in practice. The questions we are frequently asked: Who must comply with the CRA? We do not manufacture anything. Why does this concern us? We are not subject to NIS2. Why is this still relevant for...
The EU Cyber Resilience Act (CRA) and Biometric Access Control
The EU Cyber Resilience Act (CRA) and Biometric Access Control With the Cyber Resilience Act (Regulation (EU) 2024/2847), the European Union introduces binding cybersecurity requirements for products with digital elements placed on the EU market. The regulation is...
Why Europe is increasingly moving toward full ownership and control of data
Why Europe is increasingly moving toward full ownership and control of data. Europe is moving toward full data ownership. This may involve data storage within Europe or within an organization’s own infrastructure. Why? Because data stored elsewhere may fall under...



