HID ActivID Credential Management System for remote monitoring

Technical Specification

Features:
  • Make: HID
  • Model code: ActivID Credential Management System
  • Reader Types: Smart Card
  • Central / Remote Monitoring: Yes
  • Web-enabled software: Yes
Additional info:

The HID ActivID Credential Management System enables organisations to issue an authentication credential that goes beyond perimeter security. A smart card or smart token can be used to secure access to individual workstations and servers within the firewall, as well as securing VPN and other remote access use cases. The smart card or token can also be used to encrypt data, hard drives, documents and emails, and for digital signatures. It gives organisations a way to simply and securely manage their smart card and smart USB token deployments. The credential management solution makes it easy to define and apply policies to manage data, applets, digital certificates and OTP credentials across the entire product lifecycle.

Read more
Make HID
Manufacturer HID
Category Access Control>Access control software
Model code ActivID Credential Management System
Reader Types Smart Card
Central / Remote Monitoring Yes
Web-enabled software Yes
Additional info

The HID ActivID Credential Management System enables organisations to issue an authentication credential that goes beyond perimeter security. A smart card or smart token can be used to secure access to individual workstations and servers within the firewall, as well as securing VPN and other remote access use cases. The smart card or token can also be used to encrypt data, hard drives, documents and emails, and for digital signatures. It gives organisations a way to simply and securely manage their smart card and smart USB token deployments. The credential management solution makes it easy to define and apply policies to manage data, applets, digital certificates and OTP credentials across the entire product lifecycle.

Download PDF version Download PDF version

Related Whitepapers

The truth behind 9 mobile access myths

6 good reasons to embrace mobile credentialing

Three essential reasons to upgrade your access control technology in 2022

Quick poll
Which feature is most important in a video surveillance system?





$common_vars['trending_topic_article_popup'][0]->title

Revolutionary mobile acess by ABLOY CUMULUS recognised