Check out our special report on casino security
HID pivCLASS Validation Workstation Software
Technical Specification
- Make: HID
- Model code: pivCLASS Validation Workstation
- Reader Types: Smart Card
- Operating System: Windows XP SP3, Windows 2003 Server, Vista Business Edition, Windows 7
The HID pivCLASS Validation Workstation is an award-winning solution designed to assist security personnel in validating PIV, PIV-I, CIV, TWIC, FRAC, and CAC credentials and verifying cardholder identities. It can be deployed on a PC or laptop, and performs a three-step authentication process to ensure that the credential was issued to the person presenting it. It can be configured to verify that the cardholder's credential is not on the current TWIC Canceled Card List (CCL). The CCL can be imported, or can be accessed directly if the desktop has Internet connectivity.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control software |
| Model code | pivCLASS Validation Workstation |
| Reader Types | Smart Card |
| System Requirements | Operating System: Windows XP SP3, Windows 2003 Server, Vista Business Edition, Windows 7 |
| Additional info | The HID pivCLASS Validation Workstation is an award-winning solution designed to assist security personnel in validating PIV, PIV-I, CIV, TWIC, FRAC, and CAC credentials and verifying cardholder identities. It can be deployed on a PC or laptop, and performs a three-step authentication process to ensure that the credential was issued to the person presenting it. It can be configured to verify that the cardholder's credential is not on the current TWIC Canceled Card List (CCL). The CCL can be imported, or can be accessed directly if the desktop has Internet connectivity. |
More HID Access control software
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control controllers
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
