How is XyLoc different than other traditional security methods such as smart cards, biometrics, etc.?
In addition to performing identification and authentication functions like traditional security methods, XyLoc’s intelligence constantly monitors for the presence or absence of authorized users. XyLoc’s full-time access control technology addresses the major vulnerability inherent in all existing security methods – they are gatekeepers that protect the information only at the point of entry: the initial logon process. Other security solutions are not “smart” enough to recognize that users are not in control of their computers at all times after logon. After users have entered their password, inserted their token or placed their finger on the reader and they have been identified and authenticated, the gate is wide open and information assets are up for grabs the minute the user walks away from the PC.