Advertisment

myris initiates EyeLock's foray into identity authentication for enterprises

author-image
Sharath Kumar
New Update

LAS VEGAS, USA: EyeLock Inc., a market leader of iris-based identity authentication solutions, today launched myris , a USB-enabled iris identity authenticator providing the most convenient and secure way to authenticate your digital identity.

Advertisment

The consumerization of iris-based identity authentication is upon us, as more people seek stronger security alternatives in place of usernames and passwords. While iris authentication has been available to corporations and enterprises for years, no platform has been user-friendly or cost-effective enough for individuals to use in everyday situations.

EyeLock's patented iris authentication technology has provided physical access solutions to some of the world's largest, most iconic corporations for several years. EyeLock employs a unique iris authentication process that leverages dual eye authentication. This process identifies more than 240 points of unique characteristics in each human iris, ensuring identity confirmation is accurate. Combined with the utilization of video technology, EyeLock provides unprecedented security for the most important, business critical information around the globe.

myris initiates EyeLock's foray into identity authentication for enterprise and mass market use across the digital spectrum. With myris, EyeLock has distilled its proven technology platform into a palm-sized form factor to provide secure access to digital accounts. myris is the first simple-to-use technology that converts an individual's iris characteristics to an encrypted code unique to only that person, then matches the code to their eyes to grant access to the devices and digital platforms they rely on the most - all in less than one second. No lasers, no invasion of privacy, just quick, effortless access to the accounts that matter most.

Advertisment

"Usernames and passwords will soon be a thing of the past, and EyeLock's introduction of myris brings us one step closer," explained Anthony Antolino, Chief Marketing Officer of EyeLock. "People are required to remember dozens of passwords in an effort to secure their data, while organizations and individuals are in a constant struggle to keep their digital, social and financial transactions safe from compromise, breach and theft. Until service providers take the step to eliminate usernames and passwords, myris enables users to set passwords as complex as they'd like and forget them once linked to the device."

No other product delivers convenience and the highest degree of security in one solution. Unlike other iris authentication solutions, myris is simple to use-just hold up the device, look in the mirror and myris will identify one in one second. Leveraging EyeLock's proven platform technology, myris authenticates on the device itself, ensuring the maximum in secure digital access. With myris, consumers and enterprise organizations now have easy, instant and secure login to their digital access points.

myris is compatible with Windows 7 and 8, Mac OS and Chrome OS and can be used to grant access to digital networks such as online bank accounts, social media, Internet VPNs, email and more. Robust and reliable enough to secure workstations, high value transactions, critical databases and information systems for enterprise and small business.

Advertisment

As with all EyeLock identity authentication solutions, myris comes equipped with EyeLock's patented enrollment and iris-matching software. In addition enterprise customers can upgrade their security solutions by utilizing EyeLock's robust SDK to integrate seamlessly with digital platform environments. Whether in the workplace, at home or on the road, users will have peace of mind knowing access to their digital worlds will no longer be compromised.

Key features and benefits of myris include:

  • Simple set-up and user-friendly application software allow users to securely and easily manage all passwords and accounts
Advertisment
  • Authentication happens on the device - no personal information is transmitted
  • 1 in 2.25 trillion False Accept Rate ensures only the authorized user can access accounts
  • Video-based system for advanced identification

 

tech-news