SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access and Monitoring For Data Centres

    KentixONE – IoT Access and Monitoring For Data Centres

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • UK boom lift industry faces import challenges
    • Voyant Photonics unveils Helium LiDAR platform
    • Zimperium uncovers mobile PDF phishing threats
    • Matrix Comsec wins CII 2025 Women in STEM Award
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Which vertical markets have the greatest growth potential for security?
    • What’s behind (perimeter) door #1?
    • Louvre heist exposes security gaps: How smarter security could have prevented a $100 million theft
    • Why open matters in the age of AI
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Marin Hospital enhances security with eCLIQ access control

    Marin Hospital enhances security with eCLIQ access control

    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

HID Global announces innovative Credential Management System that digitises smart card technology

15 Jan 2018

HID Global announces innovative Credential Management System that digitises smart card technology
Contact company
Contact HID
icon Add as a preferred source Download PDF version

HID Global, a worldwide provider of trusted identity solutions, announced a new version of its Credential Management System (CMS) that digitises smart card technology, expands the use of digital certificates in credentials and reaches new platforms that plastic cards don’t reach. The new ActivID CMS 5.0 makes it possible for people to be authenticated for digital access without using a physical smart card.

Ultimately, HID’s new CMS will help strengthen capabilities to prevent data breaches and create a trusted digital environment. With ActivID CMS 5.0, organisations can have greater confidence to trust the people who are accessing their networks and conducting digital transactions.  

With the introduction of virtual smart cards and derived credentials, ActivID CMS 5.0 makes identification more portable digitally across cards, phones and other devices, takes advantage of new Windows software capabilities to simplify deployment of credentials, and offers the robustness and flexibility for customers to manage people’s credentials from the cloud.

HID’s CMS is widely used in the U.S. federal government to manage government ID badges

Digital access solutions

HID’s CMS is widely used in the U.S. federal government to manage government ID badges (known as PIV cards) as well as by enterprise organisations to increase the secure access of online resources. A number of technology and solution partners also rely on HID’s CMS for credential management. The customer needs that led to the development of the new capabilities in ActivID CMS 5.0 include:

  • Eliminate the burden and cost of physically provisioning each plastic card for digital access and attaching a physical reader to a computer by making deployment easier and more cost-efficient
  • Transport the same “identity’ of a person from a card to a mobile device in a seamless and compliant way
  • Provide a cloud-ready solution for partners to integrate CMS 5.0 functionality into their own cloud platforms

Credential Management System

“Our ActivID Credential Management System 5.0 is a step up for digital identity, addressing the evolving expectations of our millions of customers who are currently on CMS 4,” said Brad Jarvis, Vice President & Managing Director, IAM Solutions, with HID Global. “With ActivID CMS 5.0, we are adding a higher level of trust to digital IDs and extending the types of applications that can benefit from HID’s identity and access management solutions, namely Windows logon, VPN, document signing, encryption, online resource access and multi-factor authentication – all without requiring a physical card or attached reader.”

HID virtual smart cards

Virtual smart cards are a secure alternative to smart cards, OTP tokens and other authentication methods

Leveraging a Trusted Platform Module (TPM), virtual smart cards are a secure alternative to smart cards, OTP tokens and other authentication methods. Furthermore, with derived credentials, ActivID CMS 5.0 will enable users to use the device of choice, such as reading encrypted email on a mobile phone instead of on a desktop computer.

The same process that is commonly deployed to issue a physical smart card is used to issue derived credentials, so customers can have the assurance that security is retained while simplifying deployment and reducing costs.

Working with PIV credentials, ActivID CMS 5.0 is fully compliant with the National Institute for Standard and Technology (NIST) FIPS 201 standard, including PIV derived credentials. HID Global is the market leader for PIV cards, which are used by US federal employees to access online government resources.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Office security systems
  • Physical security
  • Public sector security
  • Security management
  • Security access systems
  • Radio frequency Identification
  • Electronic access control
  • Identity management
  • Security software
  • Corporate Security
  • Data Security
  • Cloud security
  • Mobile access
  • Related links
  • HID Access control software
  • HID Access control cards/ tags/ fobs
  • Access Control Software Access control software
  • Card Access control cards/ tags/ fobs
  • Card Access control software
  • Smart Card Access control software
  • Related categories
  • Access control software
  • Access control cards/ tags/ fobs
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Product news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec