EagleEYE

eagleEYE

K!M EagleEYE - Secure computer and application access + screen security with Face Recognition

Access to the computer is by face recognition. For liveness verification; finger biometrics and iris are used. All operations and applications used at the beginning of the screen are logged. EagleEYE automatically closes the application or session when the screen is left unattended or an unauthorized person looks at the screen. 

Categories: Face Recognition, Screen Security
Tag: Identity Access Management, Password Management, Privileged Access Management, Biometrics

Features

  • Time-based access with the world’s leading biometric technologies
  • Manufacturer independent Biometric Reader support
  • Manufacturer independent Camera support
  • Windows login with biometrics
  • Introduction to the Program with Biometrics
  • Multilingual Interface
  • Ultimate Computer Security
  • Real Time User Control (The screen turns off when the user leaves the PC)
  • Unauthorized User Control (The screen turns off when an Unauthorized User looks at the PC) reporting
  • Policy Server support
  • LDAP integration
verified

IDENTITY ACCESS MANAGEMENT

  • Automation
  • Tracing
  • Compatibility
  • Validation workflow
  • Role and Policy Management
  • Reports and Analysis
password

PASSWORD MANAGEMENT

  • Full and semi-automatic service
  • Tracing
  • 2FA and MFA integrated
  • Strong Validation
  • Unified access
data-management

PRIVILEGED ACCESS MANAGEMENT

  • Credential vault
  • Tracing
  • Random and automatic passwords
  • Role and policy management
  • Strong validation

Please click for the brochure