Check out our special report on casino security
HID ActivID authentication server with unique multi-tenant architecture
Technical Specification
- Make: HID
- Model code: ActivID Authentication Server
- Central / Remote Monitoring: Yes
- Web-enabled software: Yes
- Multiple Tenants / Partitioning: Yes
The HID ActivID Authentication Server is used by governments, enterprises and banks worldwide to secure access to critical infrastructure prevent breaches and achieve compliance with the updated FFIEC guidance, PCI DSS, and other online commerce/banking related mandates, policies and guidelines. It supports a full range of multi-factor authentication methods including Device ID, hardware and software based One Time Password (OTP) tokens, PKI credentials, Out of Band (SMS or email) codes, and static credentials such as passwords, PINs and questions and answers.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control software |
| Model code | ActivID Authentication Server |
| Central / Remote Monitoring | Yes |
| Web-enabled software | Yes |
| Multiple Tenants / Partitioning | Yes |
| Additional info | The HID ActivID Authentication Server is used by governments, enterprises and banks worldwide to secure access to critical infrastructure prevent breaches and achieve compliance with the updated FFIEC guidance, PCI DSS, and other online commerce/banking related mandates, policies and guidelines. It supports a full range of multi-factor authentication methods including Device ID, hardware and software based One Time Password (OTP) tokens, PKI credentials, Out of Band (SMS or email) codes, and static credentials such as passwords, PINs and questions and answers. |
More HID Access control software
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control controllers
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
