A: Post Authentication is our term for how companies handle the events of when the user leaves their workstations. Normally companies rely on the users to remember to secure their own workstations using keystrokes or a programmed time. Our products actively sense the presence of the user and can immediately secure the workstation when it is sensed that they have left the area.
A: Our products do not authenticate a user. They simply detect if the user has left. We compliment ANY authentication device including password, cards, biometrics, tokens and the software suites that support these methods.
The TF2000 enhances our security system at work and delivers a true cost-effective solution.
Need help? We are happy to hear from you.