EagleEYE

EagleEYE - Identity and Access Management
Access to the computer is by face recognition. For liveness verification; finger biometrics and iris are used. All operations and applications used at the beginning of the screen are logged. EagleEYE automatically closes the application or session when the screen is left unattended or an unauthorized person looks at the screen.
Categories: Face Recognition, Screen Security
Tag: Identity Access Management, Password Management, Privileged Access Management, Biometrics
Features
- Time-based access with the world’s leading biometric technologies
- Manufacturer independent Biometric Reader support
- Manufacturer independent Camera support
- Windows login with biometrics
- Introduction to the Program with Biometrics
- Multilingual Interface
- Ultimate Computer Security
- Real Time User Control (The screen turns off when the user leaves the PC)
- Unauthorized User Control (The screen turns off when an Unauthorized User looks at the PC) reporting
- Policy Server support
- LDAP integration

IDENTITY ACCESS MANAGEMENT
- Automation
- Tracing
- Compatibility
- Validation workflow
- Role and Policy Management
- Reports and Analysis

PASSWORD MANAGEMENT
- Full and semi-automatic service
- Tracing
- 2FA and MFA integrated
- Strong Validation
- Unified access

PRIVILEGED ACCESS MANAGEMENT
- Credential vault
- Tracing
- Random and automatic passwords
- Role and policy management
- Strong validation
Advantages
• Ultimate Computer Security
• Wide range of hardware support
• User-friendly WEB-based Graphics Interface, Modern Design
• Online and offline work
• Certificate management
• Human resources integration
• Compliant with PDPA Circular
• Quick installation and use with readymade profiles.
• Fast and efficient training program
• Cloud support
• Easy integration of 3rd party products
• Mobile device and tablet support
Please click for the brochure