Frequently Asked Questions


23 Φεβ 2014 (πριν από 4 χρόνια και 3 μήνες)

161 εμφανίσεις

Frequently Asked Questions

Who is Sensible Vision and what is its primary business?

Sensible Vision

Inc. is the leading provider of continuous authentication and personalization solutions
using facial recognition.

When was Sensible Vision founded and by w
hom? How is the company funded?

Sensible Vision

was founded in 2005 by George Brostoff, CEO, and Cyrus Azar, CTO. It is
headquartered in the United States, is privately funded and profitable. Teaming up for a second time,
Azar and Brostoff have proven trac
k records in starting and growing highly successful technology
companies that have ranked #26 and #470 in the Inc. Magazine’s 500 Fastest Growing Companies.

What is Sensible Vision’s product family?

Sensible Vision’s

flagship product,
is avai
lable as in Enterprise, SDK and OEM versions.

FastAccess Enterprise is an insider firewall that provides quick and continuous authentication and access
control for computers and workstations. Using patent pending biometric facial recognition,

eatly reduces or eliminates the need for login passwords, while providing superior access control with
continuous authentication to a computer. This improves a user’s productivity while ensuring that access
control policies are followed.

FastAccess SDK and

OEM allow easy and cost effective integration of industry leading authentication,
convenience and continuous security technology to their products.

What is an insider firewall?


provides an effective tool for authenticating and auditing a user
as they access a device.
Like a network firewall,

is always on guard second by second ensuring authorized access.
However, while a network firewall controls access to the networks and the internet,

is an
insider firewall that constant
ly controls access to the device itself.

What are the market needs and business drivers for FastAccess?


was conceived in response to several market drivers, including:

Organizations are increasingly aware of the critical nature of the data the
y possess in their

Public outcry for the protection of customer records, the need to protect proprietary corporate
information and privacy regulations have placed important emphasis on enhanced security.

Organizations continue to struggle to fin
d effective access control solutions that secure this
information without adding expensive and time
consuming procedures for both the user and IT


the most common existing solution

have proven both difficult to enforce and
in practice.

Existing alternative technologies including standard biometrics and tokens have proven
expensive to implement, have often been unreliable and intrusive to the user

What are the advantages of FastAccess?


represents a new paradig
m in the way users access devices. It delivers security and privacy
while simplifying access for the user. It can recognize and authenticate the user in less time than it takes
to enter a password.

is simply faster, better, cheaper and easier to

use than other
authentication methods. It delivers an access, authentication and security system which is simple and
effective for any size organization to install and maintain. Some specific advantages include:

Sensible Vision FAQ/ Page

of 3

No more unlocked unattended devices:

sers no longer have to worry that they left their
computer or mobile phone unlocked. This eliminates illegal use of the system by anyone else who
might have physical access (e.g. a fellow worker on the floor, a patient in the exam room).

User Efficiency:

Users can focus on their jobs

they no longer are confronted with the time
consuming and frustrating task of constantly entering a password or any other authentication
procedure. This saves money as users focus on their applications instead of complex pro
and authentication processes.

Improved Access Control and Auditing:

Provides an accurate audit of computer and network
access for business and regulatory compliance by providing a true audit log of who’s been at the
device and when.

Simple Setup
and Administration:

Unlike traditional security and biometric solutions, no special
enrollment procedure is needed. Administrators can configure the features of

on the
local machine or remotely through Microsoft's Active Directory.

How does Fast
Access work?


uses biometric facial recognition to provide a convenient, fast and secure way to submit a
user's account credentials to Windows or other supported operating systems. Instead of constantly typing
their account information at the log
on screen, users simply walk up to the computer and

biometrically authenticate them and log them on. Once they step away the computer will lock.

can automatically unlock the computer when they come back and return them to their
esktop as they left it. If another authorized user steps up to the computer,

can seamlessly
switch accounts for the new user.

In environments where users share a common computer and need rapid access to information,

features Instant D
esktop Switching (IDS). With IDS, multiple users can quickly access their
applications while securely sharing the same computer and network account. Access is granted to each
user almost instantly, without the usual delay in logging into the network domain
. Each user’s access with
IDS is audited and recorded.

How is FastAccess faster than other solutions?

Existing solutions all require specific and time consuming actions by the user to access the device. This
may not be a problem if a user has to enter a p
assword just once a day, but a effective security policy
requires authentication each time a user accesess a device. Entering a password 15, 20 or 50 times a
day not only consumes valuable time, but is a real hassle for the user. In contrast,

thenticates and grants access as they use their device.

Why is FastAccess better? What is Continuous Authentication and how does it differ from Initial

Passwords, tokens and biometric authentication using fingerprint, retina and voice reco
gnition provide
only initial authentication to computers. Unlike
, these access control methods have no way
of knowing when a user has stepped away from the device, leaving the computer unsecured. In an
attempt to close this dangerous vulnerabili
ty, most rely on inactivity timers. If the inactivity timer is set to
lock on a very short delay, the user is locked out as they are using the computer. Conversely, if the timer
is set long enough to not impact the user, the device is vulnerable to unautho
rized access when the user
steps away.

continually tracks the authorized user after the initial authentication and can
promptly secure the device when they step away.

What makes FastAccess easier to implement and support?

Compared to passwords,

tokens and other biometrics,

is significantly easier to implement
and support. Unlike physical tokens, there is no administration required to distribute and handle ongoing
support for lost or damaged tokens. Compared to these other biometric so

has no
special enrollment that requires user training.

My company already uses login passwords for security. Why use FastAccess?

Sensible Vision FAQ/ Page

of 3


optimizes user productivity since password policies and complex access control procedures
e valuable time away from the user’s actual work. These policies typically lead to user work
(e.g., Post
it Notes with passwords stuck on the monitor or under the keyboard or shared passwords),
defeating any benefit of a non

solution. In

a few months,
users can save hours
otherwise spent entering passwords or waiting for help resetting forgotten passwords. This typically
allows a company to pay for its

deployment within six months. Other benefits include:

Calls for l
ogin/logout support and password assistance are greatly reduced, saving additional
costs and resources.

Additional productivity gains: repetitive and complex security procedures no longer frustrate users
as they access the computer and network. As a resul
t, the users can focus on their work.

Any loss of a company's proprietary data typically results in severe business, legal and regulatory
costs and implications.

A company taking steps to protect privacy and its proprietary information can avoid public

How does FastAccess help organizations comply with data security policies and the various
compliance regulations such as HIPAA, JCAHO, etc?

All existing regulations specify the need for an audited and secure access control system.

address this need by making sure only authorized users have access to records. It goes beyond most
existing solutions by providing continuous authentication and accurately auditing who has accessed the
record. In contrast, other solutions only audit who i
nitially logged in rather than who actually accessed a
given record. Finally, because of their inherent inconvenience and complexity, existing solutions such as
password policies are often ignored by the user, rendering an organization's access control pol
ineffective and non
compliant with regulations.

What are Sensible Vision’s principal target markets and applications?


: Helping healthcare providers balance quick access to information with tight security
demanded by both internal policies
and HIPAA regulation


: Protecting R&D information; compliance with FDA regulations


: Protecting consumer database information; auditing traders’ activities; safeguarding
personal/company banking databases; restricting access to p
ersonal salary information,
employee files


: Protecting proprietary client information; restricting access to client/legal firm e


: Protecting proprietary R&D data; ensuring only authorized process control users

access to the control terminals; ensuring an accurate audit of users for proper quality control


Create a privately branded, custom version of FastAccess.


Integrate facial recognition technology into an existing application.

Is FastAc
cess system ready for real world use?

In use since 2006
, FastAccess

is a proven solution.

is currently installed in many Enterprise
and OEM applications and is included as a standard feature on computers from the world's leading
computer compani

How are Sensible Vision’s products sold? What is your channel strategy?

Sensible Vision’s

products are available directly from the company and through a growing base of
partners, resellers, systems integrators and OEMs throughout the world. The compa
ny is continues to
build its OEM relationships and to integrate

into hardware products such as point of sale,
pharmacy automation solutions and medical equipment.

# # #

Sensible Vision FAQ/ Page

of 3

FastAccess is a trademark of Sensible Vision, Inc. All other trademarks an
d trade names are the property
of their respective companies.


Press Contact:

Marcia Goff

Goff Communications

508 416 3765