Oculis Labs released PrivateEye Enterprise, a desktop security application that employs facial recognition and detection algorithms with a standard webcam to actively protect information displayed on computer screens.
PrivateEye Enterprise offers a way to secure information used by CEOs, CFOs, auditors, consultants, lawyers, doctors, investigators, HR personnel and other users seeking greater privacy.
IT Administrators can manage client policies from a standard Group Policy Management console and can tailor PrivateEye Enterprise policies for the entire domain, business units, or individual users. Importantly, this solution complies with Windows’ Server Group Policy allowing any Windows-based organization to add PrivateEye Enterprise seamlessly to its existing IT infrastructure.
Key features of the solution include:
Eavesdropper detection – Detects and alerts the user whenever eavesdroppers try to read a display. Blurs the screen keeping information private and automatically resolves when risk clears. Users can automatically protect their screen and log the eavesdropper’s face for further action.
Screen protection – Automatically protects the screen whenever the user looks away from it. Instantly clears it again when the user looks back.
Face recognition – Authenticates and unlocks the computer with just a look at the user as well as locks the computer whenever the user leaves. If anyone else tries to get into the computer, the face recognition system keeps them out.
Central policy management – Enables an IT administrator to deploy and manage security policies to all PrivateEye Enterprise clients using standard software and policy distribution mechanisms.
Compliance audit logs – Each client logs security events and reports them centrally for IT management using standard Microsoft tools. These include when the product was active, when the system activated to protect the screen, and if there were unauthorized access attempts. It may also collect unique data including who was using the machine. Whenever a failed login attempt occurs, it captures a picture of the person sitting in front of the machine to the log. Optionally, IT administrators can choose to keep pictures of anyone attempting to eavesdrop on an authorized user.