

- Ideal for Shared Workstations
- Network and Application login
- Reduces IT support time
- Cost Effective
- Excellent ROI
- Faster Workflow
Environments:
- Healthcare
- Finance
- HR
- Manufacturing
- Government
- Multiple users can maintain their open applications while sharing the same computer without compromising application data
- Prevents "tailgating" on shared computers. Each user always accesses just their login and applications
- Audit trial to review all authorized and unauthorized login attempts
- Records user images for both successful and unsuccessful authentication attempts
- Face Learning Capability: Adapts to physical changes such as beard growth and hair style
- All database information is stored in an encrypted database
- Alarm facility available if the camera is broken or disabled
- Continuous authentication-Looks for the right face every few seconds
- Locks automatically as soon as the user walks away from the computer
- Works with standard web cam
- API available for programmers to make it talk to other programs
Product by Bayometric Inc.

See also:
Why Biometrics is Important?
Glossary of Security and Biometric System Terms
Motorola LiveScan Station 4000 Portable
Panasonic BM-ET200 Iris Reader
GKA-90 Fingerprint Access Control


No comments:
Post a Comment