Multi-factor User Authentication
Multiple layers of protection to secure user account. Failing to meet any requirement: no access.
Facial Recognition with 2D/3D anti-spoofing
Distinguishes between real persons and printed graphics.
Restricted Access Rights
Exposes different subsets of the filesystem to users in different permission levels.
Real-time tracking of user behaviour
AI models monitors the user's behaviour for suspicious activity, and automatically logs them out if need be.
Control override
Administrators can forcibly take control of installed devices in the event of an attack.
Security watermarks
Deters screen capture by making the potentially malicious user's identity visible in screenshots.
Immutable persisting of captured data
Everything the system monitors is stored on ParallelChain®, making evidence tampering impossible.
Restricted external & network drives
Selectively blocks use of USB, Bluetooth, Network Storage, and other external peripherals.