(EN)About PRODUCTS : FaceLocker
What is FaceLocker and what security problem does it solve?
FaceLocker is an AI-powered security platform that provides Implicit Continuous Authentication (ICA) and real-time visual threat detection. It prevents unauthorized access, insider misuse, and screen exposure by continuously verifying the active user and detecting visual hacking attempts without disrupting usability.
How does FaceLocker establish a Zero Trust authentication model?
FaceLocker applies continuous authentication throughout the entire session—not only at login. AI automatically re-authenticates the user, ensuring credentials cannot be reused or stolen and preventing unauthorized access. This enforces the Zero Trust principle of “Never trust, always verify.”
How does FaceLocker prevent visual hacking attempts?
FaceLocker’s Vision AI monitors the screen environment in real time, detecting threats such as camera-based recording, unauthorized viewers, multiple people in front of the screen, or user absence. When risks are detected, input/output devices are instantly blocked to protect sensitive data.
How does FaceLocker maintain both security and usability?
FaceLocker operates implicitly and continuously in the background. Users do not need to perform additional authentication steps, enabling them to stay focused on their work. This ensures strong security with zero disruption to productivity.
What features does FaceLocker provide for Implicit Continuous Authentication (ICA)?
ICA detects whether the authorized user is present, identifies multiple faces, and recognizes abnormal conditions like unauthorized viewers or screen recording attempts. When dangerous conditions are detected, FaceLocker automatically locks the device or restricts screen output according to policy.
What policy-based screen protection features are included?
FaceLocker applies predefined security actions when visual threats are detected, such as triggering screen lock, activating Windows screen saver, or displaying visible/invisible watermarks. These policies allow flexible protection suited to organizational requirements.
How does FaceLocker support audit logging and security investigations?
All authentication events, visual threat detections, and abnormal behaviors are logged in detail. When a threat occurs, FaceLocker captures webcam views and active screen images, providing data for audits, compliance reporting, and post-incident investigations.
How does FaceLocker prevent spoofing and screen recording attempts?
FaceLocker uses Vision AI and liveness detection to prevent spoofing via photos or videos. It also detects camera-based or mobile phone recording attempts targeting the screen, automatically blocking them to prevent information leaks.
What integration capabilities does FaceLocker support?
FaceLocker integrates with systems such as Microsoft Azure Active Directory, HR databases, and enterprise applications. It supports both SSO and direct authentication methods, and can replace traditional Windows password login to enable passwordless authentication.
What makes FaceLocker scalable and lightweight?
FaceLocker uses a lightweight AI engine that operates efficiently without requiring GPUs, minimizing CPU consumption. Its HA/scale-out architecture allows additional servers to be added as user counts grow while maintaining a single-user domain structure for seamless expansion.