Check out our special report on Cybersecurity
HID naviGO Workstation is an Access Control Software which can be used by maximum 2 users per PC, it also includes a Knowledge Based Authentication (KBA) subsystem.
Technical Specification
- Make: HID
- Model code: naviGO Workstation
- No of concurrent PC Operators: 2 operators
- Central / Remote Monitoring: Yes
- Web-enabled software: Yes
Manages HID iCLASS and Prox Cards for PC log-on. Establishes new credentials and it also replaces/deletes them. The PIN can be changed or unblocked at log-on screen. It includes a full Knowledge Based Authentication (KBA) subsystem, which helps the end-user to have Emergency Access to Windows. It has a secure and a self-service workflow option. It also has online software updates. naviGO Workstation is built on Microsoft .NET Development Environment and is available in 10 languages.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control software |
| Model code | naviGO Workstation |
| No of concurrent PC Operators | 2 operators |
| Central / Remote Monitoring | Yes |
| Web-enabled software | Yes |
| Multiple Tenants / Partitioning | Yes |
| Additional info | Manages HID iCLASS and Prox Cards for PC log-on. Establishes new credentials and it also replaces/deletes them. The PIN can be changed or unblocked at log-on screen. It includes a full Knowledge Based Authentication (KBA) subsystem, which helps the end-user to have Emergency Access to Windows. It has a secure and a self-service workflow option. It also has online software updates. naviGO Workstation is built on Microsoft .NET Development Environment and is available in 10 languages. |
More HID Access control software
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control controllers
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
