1OfficeView is our smart office solution. One of the key technologies in this solution offering is face recognition. We are using this technology for employee presence analytics, visitor monitoring, attendance management and as one of the extensions for 2FA using face recognition.

Request Information


  • down-arrow Citrix Virtual Desktops (XenDesktop)
    1903, 1906, 1909, 1912 LTSR

Product Details

In recent times, work from home has become essential, and hence the need for secured and authentic access to corporate data has also been essential. We have introduced the Face Recognition (FR) technologies, to ensure the right people are getting access to the right corporate data. Our face recognition solution ensures that the corporate machine is only accessed by the correct user. It would automatically revoke user access to corporate data when it finds anomalies related to the wrong user in front of the system or multiple users accessing the system.

Integrating our solution with Citrix gives us a lot of flexibility to deploy the solution on a number of devices. The user is authenticated first with the AD credentials followed by Face Recognition. There are checks for face recognition of the user at random time intervals to authenticate whether the right person is accessing the system or not. In case if it is the wrong user or multiple people are sitting in front of the screen, the user is forcefully disconnected from the Citrix session. Another important aspect of our integration is, the user is monitored only when he is accessing corporate data, and while he is using his device in non-working hours or for personal use, this FR service won’t be tracing the user activities.


screenshot screenshot


  • Face recognition-based authentication of the user
  • Solution checks for face liveliness, avoiding the risk of face authentication happening through static photos or running videos
  • Customizable workflows and analytics for anomaly detection and reporting
  • Checks for shouldering with multi-face detection capabilities


  • Secure access to corporate data
  • 2-factor authentication using face recognition
  • Continuous monitoring
  • Maintaining a work-life balance