FaceX is Secure
Some facial recognition systems are easily fooled by hackers or bad actors who hold an image or video of an authorized user up to the camera in an attempt at gaining access. FaceX offers a special anti-spoofing feature designed to detect and thwart these attempts. The FaceX solution checks for and determines image liveliness, looking for signs that identify an image as being printed or originating from a mobile device. If an image is deemed to be spoofed, FaceX will refuse access and trigger alarms notifying system administrators.
Furthermore, facial recognition as an access control credential only works if a user consents to being enrolled in the system. Such consent should eliminate potential privacy concerns, but FaceX takes personal privacy one step further by storing faces as proprietary numeric code within their encrypted database, reassuring users their facial profile is not able to be used in cases outside of the system. The FaceX system also utilizes an encrypted and secure login process to prevent unauthorized access to the system and database. All users’ personal data is further encrypted both while in transit and at rest.
When compared to other credentials such as physical or mobile credentials, facial recognition is the clear standout when it comes to facilitating a zero-trust environment. The SecurOS™ FaceX facial recognition system provides highly accurate, secure, and frictionless face-as-a-credential capabilities to access control systems, new or existing. Organizations looking to deploy FaceX and facial recognition as a credential can expect increased operational efficiencies, decreased administrative tasks, and a streamlined access process.
About ISS – Intelligent Security Systems
ISS – Intelligent Security Systems headquartered in Woodbridge, NJ, and with offices worldwide, is a leader in video management and video analytics software. ISS provides a comprehensive line of digital security and surveillance video solutions which are on the forefront of on-demand security, allowing for centralized command and control of an entire enterprise security network.