Check out our special report on Cybersecurity
HID's trusted identity platform - Crescendo™
Product Profile
Key features:
- Crescendo reduces card management costs and increases user convenience by combining logical and physical access control in a single card.
- Crescendo increases productivity by saving costs and time on fewer tokens, fewer passwords and faster application access.
- Crescendo is a multi-technology smart card. By incorporating HID's industry standard proximity technology (i.e., HID, Indala®), iCLASS®, and other 13.56 MHz technologies, Crescendo is a single card that can be easily deployed for both logical and physical access control applications.
- Crescendo also serves as an employee ID badge.
- Crescendo is Windows® and MacOS X compatible.
- Crescendo cards permit enhancing corporate identity and brand recognition.
- Crescendo smart cards require no additional per-seat middleware license.
Technical Specification
| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | Crescendo C700 |
| Card/ Tag/ Fob | Card |
| Technology Type | Smart Card |
| Additional info |
Card size: ID-1 (full size). Windows and MacOS X compatible. Can be customized with the "physical access control" technologies, e.g. HID or Indala proximity, iCLASS, MIFARE and others. Anti-counterfeiting features: surface holograms, embedded holograms, micro-fine text, guilloche images, holographic overlaminates, anti-scan and anti-copy technologies, UV and infrared fluorescing inks. Customizable layout. |
- See other HID products
- HID Access control readers
- HID Access control controllers
- HID Access control software
Related Whitepapers
A brief history of access control credentials
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

