FR-MOTP Server is Gorilla’s AI appliance that performs the backend for FR-MOTP, a verification system that performs identity authentication of users for an enterprise or organization. The FR-MOTP Server performs user management with the system’s two other components: the FR-MOTP mobile app (Android, iOS), and a MOTP Agent (installed on the user’s Windows or Linux device).
FR-MOTP uses Gorilla’s advanced face recognition (FR) technology which verifies staff biometrics on their mobile phone and generated a time sensitive Mobile One Time Password (MOTP). This one-time use dynamic password greatly helps prevent access breaches, even if login credentials have been hacked. User verification records are securely stored on the FR-MOTP server for auditing and abnormal login identification.
Make it next to impossible for hackers to infiltrate your network by adding FR-MOTP to traditional account logins for multi-factor and real-time authentication.
User identities are verified in real-time with the edge AI biometric technology developed by Gorilla and a one-time password is sent to their personal device - ensuring the right person’s login while protecting privacy.
Record staff logins along with face recognition results in real-time. Logs of failed verifications can allow managers to perceive intrusions in advance.
Easily strengthen your login verification system without changing OS accounts and passwords.
Windows: local consoles & remote desktops Linux: local consoles, Telnet & SSH
FR-MOTP utilizes AD integration with a Windows or Linux Login Agent for easy implementation into corporate IT environments.
Automatically create tailor-made network security with AI-based behavior analysis of targeted attack activities while reducing the large and recurring costs of increasing staff.
Intervene early when unknown threats are identified and easily process incidents with automated and always-on AI-based threat pattern learning.
Protect intellectual property, customer loyalty, brand reputation and revenue by reducing the risk of internal confidentiality and customer information being leaked.
Shorten response times when attacks occur, uncover the root cause of security problems, and restore business operations without interruption.