> About Us
> Executive Bios
> Press Room
> Contact Us
Frequently Asked Questions
home > company > FAQ

Who is Sensible Vision and what is its primary business?

Sensible Vision Inc. is the leading provider of continuous authentication and personalization solutions using facial recognition.

<back to top>

When was Sensible Vision founded and by whom? How is the company funded?

Sensible Vision was founded in 2005 by George Brostoff, CEO, and Cyrus Azar, CTO. It is headquartered in the United States, is privately funded and profitable. Teaming up for a second time, Azar and Brostoff have proven track records in starting and growing highly successful technology companies that have ranked #26 and #470 in the Inc. Magazine’s 500 Fastest Growing Companies.

<back to top>

What is Sensible Vision’s product family?

Sensible Vision’s flagship product, FastAccess™, is available as in Enterprise, SDK and OEM versions.

FastAccess Enterprise is an insider firewall that provides quick and continuous authentication and access control for computers and workstations. Using patent pending biometric facial recognition, FastAccess greatly reduces or eliminates the need for login passwords, while providing superior access control with continuous authentication to a computer. This improves a user’s productivity while ensuring that access control policies are followed.

FastAccess SDK and OEM allow easy and cost effective integration of industry leading authentication, convenience and continuous security technology to their products.

<back to top>

What is an insider firewall?

FastAccess provides an effective tool for authenticating and auditing a user as they access a device. Like a network firewall, FastAccess is always on guard second by second ensuring authorized access. However, while a network firewall controls access to the networks and the internet, FastAccess is an insider firewall that constantly controls access to the device itself.

<back to top>

What are the market needs and business drivers for FastAccess?

FastAccess was conceived in response to several market drivers, including:

  • Organizations are increasingly aware of the critical nature of the data they possess in their servers.
  • Public outcry for the protection of customer records, the need to protect proprietary corporate information and privacy regulations have placed important emphasis on enhanced security.
  • Organizations continue to struggle to find effective access control solutions that secure this information without adding expensive and time-consuming procedures for both the user and IT staff.
  • Passwords — the most common existing solution — have proven both difficult to enforce and ineffective in practice.
  • Existing alternative technologies including standard biometrics and tokens have proven expensive to implement, have often been unreliable and intrusive to the user .

<back to top>

What are the advantages of FastAccess?

FastAccess represents a new paradigm in the way users access devices. It delivers security and privacy while simplifying access for the user. It can recognize and authenticate the user in less time than it takes to enter a password. FastAccess is simply faster, better, cheaper and easier to use than other authentication methods. It delivers an access, authentication and security system which is simple and cost-effective for any size organization to install and maintain. Some specific advantages include:

  • No more unlocked unattended devices: Users no longer have to worry that they left their computer or mobile phone unlocked. This eliminates illegal use of the system by anyone else who might have physical access (e.g. a fellow worker on the floor, a patient in the exam room).
  • User Efficiency: Users can focus on their jobs – they no longer are confronted with the time-consuming and frustrating task of constantly entering a password or any other authentication procedure. This saves money as users focus on their applications instead of complex procedures and authentication processes.
  • Improved Access Control and Auditing: Provides an accurate audit of computer and network access for business and regulatory compliance by providing a true audit log of who’s been at the device and when.
  • Simple Setup and Administration: Unlike traditional security and biometric solutions, no special enrollment procedure is needed. Administrators can configure the features of FastAccess on the local machine or remotely through Microsoft's Active Directory.

<back to top>

How does FastAccess work?

FastAccess uses biometric facial recognition to provide a convenient, fast and secure way to submit a user's account credentials to Windows or other supported operating systems. Instead of constantly typing their account information at the logon screen, users simply walk up to the computer and FastAccess will biometrically authenticate them and log them on. Once they step away the device will lock. FastAccess can automatically unlock the device when they come back and show them the same data as they left it. If another authorized user steps up to the device, FastAccess can seamlessly switch accounts for the new user.

In environments where users share a common computer and need rapid access to information, FastAccess features Instant Desktop Switching (IDS). With IDS, multiple users can quickly access their applications while securely sharing the same computer and network account. Access is granted to each user almost instantly, without the usual delay in logging into the network domain. Each user’s access with IDS is audited and recorded.

<back to top>

How is FastAccess faster than other solutions?

Existing solutions all require specific and time consuming actions by the user to access the device. This may not be a problem if a user has to enter a password just once a day, but a effective security policy requires authentication each time a user accesses a device. Entering a password 15, 20 or 50 times a day not only consumes valuable time, but is a real hassle for the user. In contrast, FastAccess authenticates and grants access as they use their device.

<back to top>

Why is FastAccess better? What is Continuous Authentication and how does it differ from Initial Authentication?

Passwords, tokens and biometric authentication using fingerprint, retina and voice recognition provide only initial authentication to computers. Unlike FastAccess, these access control methods have no way of knowing when a user has stepped away from the device, leaving the computer unsecured. In an attempt to close this dangerous vulnerability, most rely on inactivity timers. If the inactivity timer is set to lock on a very short delay, the user is locked out as they are using the computer. Conversely, if the timer is set long enough to not impact the user, the device is vulnerable to unauthorized access when the user steps away. FastAccess continually tracks the authorized user after the initial authentication and can promptly secure the device when they step away.

<back to top>

What makes FastAccess easier to implement and support?

Compared to passwords, tokens and other biometrics, FastAccess is significantly easier to implement and support. Unlike physical tokens, there is no administration required to distribute and handle ongoing support for lost or damaged tokens. Compared to these other biometric solutions, FastAccess has no special enrollment that requires user training.

<back to top>

My company already uses login passwords for security. Why use FastAccess?

FastAccess optimizes user productivity since password policies and complex access control procedures take valuable time away from the user’s actual work. These policies typically lead to user work-arounds (e.g., Post-it Notes with passwords stuck on the monitor or under the keyboard or shared passwords), defeating any benefit of a non-FastAccess solution. In a few months, FastAccess users can save hours otherwise spent entering passwords or waiting for help resetting forgotten passwords. This typically allows a company to pay for its FastAccess deployment within six months. Other benefits include:

  • Calls for login/logout support and password assistance are greatly reduced, saving additional costs and resources.
  • Additional productivity gains: repetitive and complex security procedures no longer frustrate users as they access the computer and network. As a result, the users can focus on their work.
  • Any loss of a company's proprietary data typically results in severe business, legal and regulatory costs and implications.
  • A company taking steps to protect privacy and its proprietary information can avoid public embarrassment.

How does FastAccess help organizations comply with data security policies and the various compliance regulations such as HIPAA, JCAHO, etc?

All existing regulations specify the need for an audited and secure access control system. FastAccess address this need by making sure only authorized users have access to records. It goes beyond most existing solutions by providing continuous authentication and accurately auditing who has accessed the record. In contrast, other solutions only audit who initially logged in rather than who actually accessed a given record. Finally, because of their inherent inconvenience and complexity, existing solutions such as password policies are often ignored by the user, rendering an organization's access control policy ineffective and non-compliant with regulations.

<back to top>

What are Sensible Vision’s principal markets and applications?

  • Healthcare : Helping healthcare providers balance quick access to information with tight security demanded by both internal policies and HIPAA regulation
  • Pharmaceutical : Protecting R&D information; compliance with FDA regulations
  • Financial : Protecting consumer database information; auditing traders’ activities; safeguarding personal/company banking databases; restricting access to personal salary information, employee files
  • Legal : Protecting proprietary client information; restricting access to client/legal firm e-mail repositories
  • Manufacturing : Protecting proprietary R&D data; ensuring only authorized process control users have access to the control terminals; ensuring an accurate audit of users for proper quality control analysis.
  • OEM: Create a privately branded, custom version of FastAccess.
  • SDK: Integrate facial recognition technology into an existing application.

<back to top>

Is FastAccess ready for real world use?

In use since 2006, FastAccess is a field proven solution. FastAccess is currently installed in many Enterprise and OEM applications and is included as a standard feature on computers from the world's leading computer companies.

<back to top>

How are Sensible Vision’s products sold? What is your channel strategy?

Sensible Vision’s products are available directly from the company and through a growing base of partners, resellers, systems integrators and OEMs throughout the world. The company is continues to build its OEM relationships and to integrate FastAccess into hardware products such as point of sale, pharmacy automation solutions and medical equipment.

<back to top>

  Get More Info  
  Tell an Associate  
  How to Buy  
  Dell Support  
40376 Blue Star Highway #11 • Covert, MI 49043 • 269.932.4548 • © 2006-2009 Sensible Vision Inc.