Biologon - The Corporate Gatekeeper

A person types on a laptop displaying a digital biometrics interface, with the text "BIOLOGON The Corporate Gatekeeper" overlaid.

Biologon-for Safely Accessing both the IT and the Physical Environment.
Maximum Security.Minimum Hassle.

Biologon, Comda’s flagship system, provides top-tier identity management and access control using advanced biometric technology. Utilizing fingerprint reading and facial recognition, Biologon ensures maximum security for access to computers and various organizational systems. Key features include:

  • Unique identification of users without the need for names and passwords
  • Reliable user identification within the organization
  • Secure entry into organizational systems
  • Protection of organizational information
  • Infographic showing Biologon as "The Corporate Gatekeeper" with four benefits: user identification, data safeguarding, secure system access, and reliable authentication.

    How It Works?

    A folder icon above a network of seven connected circles, representing hierarchical organization or file sharing structure.

    Active Directory

    Manages user accounts, network identities, and fingerprint template storage.

    A server computer connected to two desktop monitors, illustrating a basic computer network setup.

    Biologon Client

    Manages user interface and client-server connectivity.

    Line drawing of three server racks connected by cables, representing a network or data center infrastructure.

    Biologon Server

    Manages authentication, logic, and references to other servers.

    A blue fingerprint icon surrounded by four blue corner brackets, suggesting biometric scanning or identification.

    Biometric reader

    Installed at end stations to capture and identify fingerprints.

    Diagram illustrating features of a security system, including access control, authentication, remote access, data protection, and compatibility with various environments and devices.

    Advanced Features for Effective Management

    • AES 256 Encryption: An encryption standard endorsed by American authorities.
    • Secure channel from client to server: Using TLS 1.2 with mutual authentication.
    • User Privacy Protection:
    • Fingerprint/Facial Images not retained
    • Fingerprint/Facial data stored in a proprietary format
    • Authorized Identification: Only AD groups users authenticated.
    • Login Attempt Registration: In the central log system.
    • Malfunction Bypass Option: In case of system failure.
    • Customized Logging Policies: On an individual or group-based level.
    • Multi-User Support: On the same station.
    • Quick Login: Without username requirement.
    • Biometric Transfer: Via RDP.

    Dynamic Protection that Grows with You

    • Windows Connection: Prevents unauthorized access to the desktop.
    • Versatile Facility and Technology Support: Combines different authentication methods in a single process.
    • Instant Corporate Website Access: Via fingerprint or facial recognition.
    • Personal Information Protection: Via a fingerprint recognition mechanism.
    • Virtual Environment Support: Compatible with Citrix, Cockpit, and WYSE.
    • Custom Software Development Kit (SDK): Tailored to meet specific needs.
    • Maximum Flexibility and Durability: Offers automatic scalability, maximum availability, and complete redundancy.
    • Advanced Features: Supports multiple fingerprints, remote unlocking, VPN, and SMS functionality.
    A flowchart showing biometric identification, optimization, one-way processing, and secure database storage of fingerprint data.

    Automatic integration with all leading enterprise systems

    Web (Web logon) | Active Directory | Remote Desktop-based systems

    Cockpit | Citrix | VMWare | Dell Wyse Thin Client

    Ready to take the leap?

    To schedule an initial consultation call or email us:

    Skip to content