iDentify Facial Search Tool

By John Honovich, Published Sep 10, 2012, 08:00pm EDT (Info+)

A facial recognition tool was selected by ASIS as one of the 10 best new products at their 2012 show. While facial recognition has been around for many years, it remains a niche. In this note, we review the product, iDentify Face Search examining how it fits in the market, what applications it is best for and what competitive options exist to it.

Background

*** *********,************, **** ******* ** * **** management *** ******** ****, ***********. *** *** ****** *********** **** is ******** ** ** **** ** a ********* ** **** ******* ******** but *** ** ********* *** **** separately. ************, ************ ****** * **** time ****** ************ ********,*********** ** **** ***** *** ********* ****** ******************** ****-******** ********.

******** ** ***** ****** *********** **** allows ***** ** ****** ***** *** photos *** **** ******* ***** ****, using ****** *********** *** ****** ********. The ******* **** *** ******* ***** party ****** *** ***** ***** *** is ******** *** *** ** ****** organizations **** ***** ******** ***** ********* of ****** ** *********, ********, ***. When **** **** ***** ****** **** management ********, ** *** ****** *** into ***** **** ******** ***** ******** and ******. *** **** ***** ***** overviews ***** ********:

********, ********* **********, ** ********* *** ~$10,000 ***.

Competitive *******

** *** ***** ** * *********** options:

  • ****** ********** ****** ******* ****** * [link ** ****** *********] ***** ** a ******* ***** ******, ******* ** the ****** ****** **** ****** ****** of ***** "**** ********, **** *** table **** ****** (***** **** ***** associates), ********* *****, ****** *****," **** regular ******* ** ***** *****. ** do *** **** ******* *** **** offering.
  • *** ********** * *** ******* **** ******* sharing *** ********* ****** *** ************** of ******** ***** *** ***** ********* in ******, ******* *** ****** (******** ***** ****). **** * **** ******* * suspect *****, * ******** ******* **** run ***'* ****** *********** ** **** photo ******* ******** ******** ** ******** and **** ******* **** *********** **** to *** ****. ************, ******** *** be **** ** ***********, ****** *** share *********** ** ******** *** ** does *** ******* *********** **** ********** tools. ******** ***** $*** *** **** though *** ******* ******* **** ***** are ******* *** ************ ** ******** and ***** *************.

*** **** ********** ** ***** *** is ******* **** / ********* ******* 3rd ***** **********.

**********

***** *** *****, **** *** ******** one's *** ******** *** **** *** as **** ** ** ****** **** management ******, ** *** ******** ** a ***** **** *** ***** ***** organizations.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts reporting, tutorials and software funded by subscriber's payments enabling us to offer the most independent, accurate and in-depth information.
Loading Related Reports