Optimal security for critical corporate environments

#highsecure
Optimal security for critical corporate environments

Ensure maximal security with two-factor authentication: privacy proof facial recognition and an access card.

Why this solution

  • Grant access with the combination of facial recognition and an access card
  • Prevent unauthorized access
  • Stolen or lost cards are no longer a security threat
  • Non-transferrable: only the combination of facial recognition and card grants access

How it works

Ensure maximal security with two factor authentication: privacy proof facial recognition and an access card.
1

The authorized person receives a registration link via email.

2

They then register themselves by making a picture with their own phone, tablet or computer.

3

The software calculates a unique facial vector from this photo. The photo itself will be deleted.

4

With one push of a button, the user can give or retract their permission to use the vector for facial recognition.

5

The gate or door will only open if the pass is scanned and the person’s face is recognised.

„Crime and fraud stand less and less of a chance; it’s nearly impossible to gain access to facilities without having the rights to do so. ”
Frank de Krou (Secure Logistics)

- Frank de Krou (Secure Logistics)

Use case: Secure Logistics

In an environment like the port of Rotterdam, how do you make sure that drivers and contractors have quick and safe access to certain areas and terminals? 

By using 20face’s facial recognition, Secure Logistics ensures access management can take place without the need for physical touch (like is necessary with hand- or fingerscanners). This makes access more hygienic, while at the same time ensuring safety and privacy.

Keep reading

Want to know more about the solution?

Experience the solution live

Make an appointment and we’ll let you experience how fast and easy the solution works yourself.

Experience the solution live

Download one of our resources

Discover our resources to find more information about the solution first.

Download one of our resources