HID Global, global provider of trusted identity solutions, has announced the availability of the new HID Authentication Service, which is part of its cloud identity platform, designed to deliver a suite of trusted identity solutions. These services make it easy to manage and use identities through a secure cloud delivery model. This multi-tenant cloud authentication service offers large scale, simplified on-boarding of users and frictionless authentication for identity and access management (IAM) customers spanning a variety of industries.

Regulations, such as GDPR, PSD2, the California Privacy Regulation and HIPAA, are causing organisations to struggle to provide the necessary security, convenience and compliance for user access. These organisations often deploy a patchwork of identity solutions – on-premise, cloud or hybrid – from different vendors that don’t work well together or don’t provide the necessary authentication services to meet their compliance needs. The result is complexity, IT overhead, organisational confusion and solutions that don’t scale or comply with regulatory requirements.

HID Authentication Service HID’s new IAM cloud solution will continue to build in new services that allow organisations to leverage their existing technology to accomplish new identity goals

The HID Authentication Service removes this complexity and the related challenges of providing multifactor authentication to a growing and diverse population of users. While other identity vendors offer single-purpose authentication solutions that may solve one problem, HID’s new IAM cloud solution will continue to build in new services that allow organisations to leverage their existing technology to accomplish new identity goals. It also provides centralised audit logs to simplify compliance capabilities and reduce the burden of audits.

HID Global continues its move toward cloud solutions with the addition of new IAM services, expanding the offering with a unifying technology platform for our millions of users,” said Brad Jarvis, Vice President & Managing Director of Identity & Access Management Solutions (IAMS) with HID Global. “HID is among the only IAM solution providers that can offer authentication for high security use cases all the way down to basic enterprise multifactor authentication. With this breadth of solutions, we believe that organisations in regulated markets, in particular, will gain the most significant benefits from the HID Authentication Service.

IAM cloud solution

Users gain the benefits of the flexibility, scalability and cost-effectiveness of a cloud-based services IAM platform. In financial services, for example, access to high-value transactions can be protected by integrating API calls to the HID Authentication Service from third-party software, such as the Temenos T24 core banking platform. In healthcare, a partner can build patient access to healthcare portals to be HIPAA-compliant.

To make this happen, HID is making APIs available to developers, partners and managed security service providers (MSSPs) to offer scalable, built-in authentication services. As a trusted partner, HID will provide toolkits to system integrators and IT programmers to support the rollout. At the same time, HID will continue to sell and support its award-winning on-premise IAM solutions.

Multi-factor authentication

HID’s new cloud solution is purpose-built for IT teams to manage identities in mixed environments

HID’s new cloud solution is purpose-built for IT teams to manage identities in mixed environments. With sophisticated attacks on the rise, the HID Authentication Service is an ideal platform for handling a large-scale rollout, testing, provisioning and delivery of authentication services to protect networks and applications.

HID Global powers the trusted identities of the global population and has one of the broadest portfolios of identity and access management products and services. These solutions range across a broad spectrum that includes multi-factor authentication, intelligence-driven risk-based authentication, physical identity and access management, credential management, digital signing and digital encryption. Users can also take advantage of the industry’s widest range of end-point authenticators, including mobile devices, smart cards and tokens, among others.

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?