xyloc scotland proximity login

NETWORK and Intranet SECURITY can be enhanced by using the XyLoc PROXIMITY SENSOR LOGIN to automatically identify and authenticate users. Usernames and passwords are the standard method of identifying users, but what happens when the user steps away from the PC ?


XyLoc was designed to close this window of vulnerability. XyLoc provides full-time access control by determining a user's location and automatically locking the computer when the user is not physically present. With XyLoc, networks are not compromised when employees leave their computers unattended. XyLoc takes the burden of compliance off the user and brings to security a level of personalization and convenience never before possible.


Hands-free login with XyLoc
With XyLoc, employees no longer have to re-enter their passwords each time they approach their computer. With hands-free auto logon, a user can be automatically logged on to the machine as they approach it. XyLoc recognizes users and determines their access privileges, preventing information from falling into the wrong hands. The result is convenient, personalised security for a variety of business environments.

The XyLoc range of products includes:

Our key philosophy is to act as a clear channel of communication between you and the technology. In short, 'we understand IT, so you don't have to!'

We hope you find some useful information within the website, and look forward to assisting you in enhancing your effective use of computer technology, broadband and the internet.

xyloc automatic login scotland> </p>
  <h1 align=

How does XyLoc work ?

  1. XyLoc consists of a radio transceiver "Lock" plugged into the computer and a wireless radio transmitter user "Key".
  2. The Lock and Key stay in constant radio communication (up to 50 feet, or 15 metres) to determine user identity and location relative to the computer.
  3. When you approach a computer protected by XyLoc while wearing a XyLoc Key, the Key automatically transmits a unique, 32-bit encrypted ID code to the Lock.
  4. The Lock verifies your identity with the XyLoc administration software; if authorised, the XyLoc system will unlock the computer's keyboard and screen.
  5. If unauthorised, the system remains locked and information secure. With the hands-free auto logon, a user can be automatically logged on to the machine as they approach it.
  6. XyLoc recognises users and determines their access privileges, preventing information from falling into the wrong hands. The result is convenient, personalised security for a variety of business environments.
  7. XyLoc is the only security solution that continues to protect the network after a user has logged on.

Disclaimer- Please note that information on this website is provided for general guidance only. The information is provided as-is and makes no representations or warranties of any kind regarding it. online-edge Ltd. disclaims all liability of any kind whatsoever arising out of your use of, or inability to use, this website and the information contained on it.

Background information on online-edge Ltd.

 

online-edge was established in the year 2000, to assist Scottish clients (commercial organisations, colleges, universities and local/central government bodies, and especially small-medium businesses) in improving their computer security.

 

Why not work with online-edge so that you can concentrate on running your organisation and let us take care of the technology?

 

Specific issues we assist clients with cover the following computer and network security issues-

 

 

 

 

CLICK HERE to return to the Top of this page.