Frequently Asked Questions

superfluitysmackoverΑσφάλεια

23 Φεβ 2014 (πριν από 3 χρόνια και 4 μήνες)

76 εμφανίσεις



Frequently Asked Questions

Who is Sensible Vision and what is its primary business?

Sensible Vision

Inc. is the leading provider of continuous authentication and personalization solutions
using facial recognition.


When was Sensible Vision founded and by w
hom? How is the company funded?

Sensible Vision

was founded in 2005 by George Brostoff, CEO, and Cyrus Azar, CTO. It is
headquartered in the United States, is privately funded and profitable. Teaming up for a second time,
Azar and Brostoff have proven trac
k records in starting and growing highly successful technology
companies that have ranked #26 and #470 in the Inc. Magazine’s 500 Fastest Growing Companies.


What is Sensible Vision’s product family?

Sensible Vision’s

flagship product,
FastAccess,
is avai
lable as in Enterprise, SDK and OEM versions.

FastAccess Enterprise is an insider firewall that provides quick and continuous authentication and access
control for computers and workstations. Using patent pending biometric facial recognition,
FastAccess

gr
eatly reduces or eliminates the need for login passwords, while providing superior access control with
continuous authentication to a computer. This improves a user’s productivity while ensuring that access
control policies are followed.

FastAccess SDK and

OEM allow easy and cost effective integration of industry leading authentication,
convenience and continuous security technology to their products.


What is an insider firewall?

FastAccess

provides an effective tool for authenticating and auditing a user
as they access a device.
Like a network firewall,
FastAccess

is always on guard second by second ensuring authorized access.
However, while a network firewall controls access to the networks and the internet,
FastAccess

is an
insider firewall that constant
ly controls access to the device itself.


What are the market needs and business drivers for FastAccess?

FastAccess

was conceived in response to several market drivers, including:




Organizations are increasingly aware of the critical nature of the data the
y possess in their
servers.



Public outcry for the protection of customer records, the need to protect proprietary corporate
information and privacy regulations have placed important emphasis on enhanced security.



Organizations continue to struggle to fin
d effective access control solutions that secure this
information without adding expensive and time
-
consuming procedures for both the user and IT
staff.



Passwords


the most common existing solution


have proven both difficult to enforce and
ineffective
in practice.



Existing alternative technologies including standard biometrics and tokens have proven
expensive to implement, have often been unreliable and intrusive to the user



What are the advantages of FastAccess?

FastAccess

represents a new paradig
m in the way users access devices. It delivers security and privacy
while simplifying access for the user. It can recognize and authenticate the user in less time than it takes
to enter a password.
FastAccess

is simply faster, better, cheaper and easier to

use than other
authentication methods. It delivers an access, authentication and security system which is simple and
cost
-
effective for any size organization to install and maintain. Some specific advantages include:

Sensible Vision FAQ/ Page
2

of 3



No more unlocked unattended devices:

U
sers no longer have to worry that they left their
computer or mobile phone unlocked. This eliminates illegal use of the system by anyone else who
might have physical access (e.g. a fellow worker on the floor, a patient in the exam room).



User Efficiency:

Users can focus on their jobs


they no longer are confronted with the time
-
consuming and frustrating task of constantly entering a password or any other authentication
procedure. This saves money as users focus on their applications instead of complex pro
cedures
and authentication processes.



Improved Access Control and Auditing:

Provides an accurate audit of computer and network
access for business and regulatory compliance by providing a true audit log of who’s been at the
device and when.



Simple Setup
and Administration:

Unlike traditional security and biometric solutions, no special
enrollment procedure is needed. Administrators can configure the features of
FastAccess

on the
local machine or remotely through Microsoft's Active Directory.

How does Fast
Access work?

FastAccess

uses biometric facial recognition to provide a convenient, fast and secure way to submit a
user's account credentials to Windows or other supported operating systems. Instead of constantly typing
their account information at the log
on screen, users simply walk up to the computer and
FastAccess

will
biometrically authenticate them and log them on. Once they step away the computer will lock.
FastAccess

can automatically unlock the computer when they come back and return them to their
d
esktop as they left it. If another authorized user steps up to the computer,
FastAccess

can seamlessly
switch accounts for the new user.

In environments where users share a common computer and need rapid access to information,
FastAccess

features Instant D
esktop Switching (IDS). With IDS, multiple users can quickly access their
applications while securely sharing the same computer and network account. Access is granted to each
user almost instantly, without the usual delay in logging into the network domain
. Each user’s access with
IDS is audited and recorded.


How is FastAccess faster than other solutions?

Existing solutions all require specific and time consuming actions by the user to access the device. This
may not be a problem if a user has to enter a p
assword just once a day, but a effective security policy
requires authentication each time a user accesess a device. Entering a password 15, 20 or 50 times a
day not only consumes valuable time, but is a real hassle for the user. In contrast,
FastAccess

au
thenticates and grants access as they use their device.


Why is FastAccess better? What is Continuous Authentication and how does it differ from Initial
Authentication?

Passwords, tokens and biometric authentication using fingerprint, retina and voice reco
gnition provide
only initial authentication to computers. Unlike
FastAccess
, these access control methods have no way
of knowing when a user has stepped away from the device, leaving the computer unsecured. In an
attempt to close this dangerous vulnerabili
ty, most rely on inactivity timers. If the inactivity timer is set to
lock on a very short delay, the user is locked out as they are using the computer. Conversely, if the timer
is set long enough to not impact the user, the device is vulnerable to unautho
rized access when the user
steps away.
FastAccess

continually tracks the authorized user after the initial authentication and can
promptly secure the device when they step away.


What makes FastAccess easier to implement and support?

Compared to passwords,

tokens and other biometrics,
FastAccess

is significantly easier to implement
and support. Unlike physical tokens, there is no administration required to distribute and handle ongoing
support for lost or damaged tokens. Compared to these other biometric so
lutions,
FastAccess

has no
special enrollment that requires user training.


My company already uses login passwords for security. Why use FastAccess?

Sensible Vision FAQ/ Page
3

of 3

FastAccess

optimizes user productivity since password policies and complex access control procedures
tak
e valuable time away from the user’s actual work. These policies typically lead to user work
-
arounds
(e.g., Post
-
it Notes with passwords stuck on the monitor or under the keyboard or shared passwords),
defeating any benefit of a non
-
FastAccess

solution. In

a few months,
FastAccess
users can save hours
otherwise spent entering passwords or waiting for help resetting forgotten passwords. This typically
allows a company to pay for its
FastAccess

deployment within six months. Other benefits include:



Calls for l
ogin/logout support and password assistance are greatly reduced, saving additional
costs and resources.



Additional productivity gains: repetitive and complex security procedures no longer frustrate users
as they access the computer and network. As a resul
t, the users can focus on their work.



Any loss of a company's proprietary data typically results in severe business, legal and regulatory
costs and implications.



A company taking steps to protect privacy and its proprietary information can avoid public
e
mbarrassment.

How does FastAccess help organizations comply with data security policies and the various
compliance regulations such as HIPAA, JCAHO, etc?

All existing regulations specify the need for an audited and secure access control system.
FastAccess

address this need by making sure only authorized users have access to records. It goes beyond most
existing solutions by providing continuous authentication and accurately auditing who has accessed the
record. In contrast, other solutions only audit who i
nitially logged in rather than who actually accessed a
given record. Finally, because of their inherent inconvenience and complexity, existing solutions such as
password policies are often ignored by the user, rendering an organization's access control pol
icy
ineffective and non
-
compliant with regulations.


What are Sensible Vision’s principal target markets and applications?



Healthcare

: Helping healthcare providers balance quick access to information with tight security
demanded by both internal policies
and HIPAA regulation



Pharmaceutical

: Protecting R&D information; compliance with FDA regulations



Financial

: Protecting consumer database information; auditing traders’ activities; safeguarding
personal/company banking databases; restricting access to p
ersonal salary information,
employee files



Legal

: Protecting proprietary client information; restricting access to client/legal firm e
-
mail
repositories



Manufacturing

: Protecting proprietary R&D data; ensuring only authorized process control users
have

access to the control terminals; ensuring an accurate audit of users for proper quality control
analysis.



OEM:

Create a privately branded, custom version of FastAccess.



SDK:

Integrate facial recognition technology into an existing application.

Is FastAc
cess system ready for real world use?

In use since 2006
, FastAccess

is a proven solution.
FastAccess

is currently installed in many Enterprise
and OEM applications and is included as a standard feature on computers from the world's leading
computer compani
es.


How are Sensible Vision’s products sold? What is your channel strategy?

Sensible Vision’s

products are available directly from the company and through a growing base of
partners, resellers, systems integrators and OEMs throughout the world. The compa
ny is continues to
build its OEM relationships and to integrate
FastAccess

into hardware products such as point of sale,
pharmacy automation solutions and medical equipment.


# # #

Sensible Vision FAQ/ Page
4

of 3

FastAccess is a trademark of Sensible Vision, Inc. All other trademarks an
d trade names are the property
of their respective companies.

2/2006


Press Contact:

Marcia Goff

Goff Communications

508 416 3765

marcia@goffpr.com