HID Global is the trusted source for secure identity solutions for millions of customers around the world
HID Global's smart cards and brand readers are compatible with McAfee Endpoint Encryption
HID Global, the trusted source for solutions for the delivery of secure identity, recently announced that the company's Crescendo® smart cards and OMNIKEY® brand readers have been successfully tested for compatibility with McAfee® Endpoint Encryption.

Through its inclusion in the McAfee Security Innovation Alliance™ (SIA), HID Global is recognised among leading security innovators, enabling McAfee users to leverage HID's converged solutions for logical and physical access. With HID's Crescendo smart cards and OMNIKEY brand readers, organisations can take advantage of a single card for two-factor authentication to secure data on IT networks and PCs, as well as secure physical access to facilities.

Easily deployed out-of-the-box, HID's Crescendo smart cards make it simple and convenient to implement pre-boot authentication and disk encryption, as offered by McAfee Endpoint Encryption for PCs, providing customers unparalleled cost savings and return on investment. When coupled with HID's OMNIKEY brand readers, Crescendo enables two-factor authentication to desktop, mobile and laptop computer applications, reducing risk and unauthorised access to sensitive data, while combining logical and physical access control into a single card solution.

"HID's Crescendo and OMNIKEY solutions are ideal for end-users looking to implement secure authentication in conjunction with data encryption and access control systems," said Brad Jarvis, vice president, Product Marketing, HID Global. "McAfee users that implement this integrated solution will directly benefit from reduced risk through two-factor authentication, a lower total cost of ownership for secure credentials and credential management throughout the company's entire security enterprise."

Crescendo™ and OMNIKEY® products make it simple to implement two-factor authentication for IT networks and laptops

"We are delighted to recognise a range of smart cards and readers from HID Global as McAfee Compatible," said Ed Barry, senior director, McAfee Security Innovation Alliance. "By implementing products that are compatible with McAfee solutions, our customers experience faster deployment times and reduced costs. The result is greater protection, reduced risk and increased compliance."

McAfee Endpoint Encryption (formerly SafeBoot® Device Encryption) includes full disk encryption to ensure security of information stored on desktops, laptops, tablets and other mobile devices. Security administrators can set a system to prompt for authentication before it even starts booting to protect against possible attacks on the operating system, or just before it is finished booting. Users must insert their HID Crescendo card and enter a passphrase or PIN before being authorised to access the system data. This procedure provides the highest levels of security that only two-factor authentication can provide.

Download PDF version Download PDF version

In case you missed it

Proactive security: the future of perimeter defence
Proactive security: the future of perimeter defence

The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. W...

What are the benefits, and drawbacks, of AI in security?
What are the benefits, and drawbacks, of AI in security?

Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthrou...

ASSA ABLOY solution: Digital cabinet locks help Helsinki Airport to improve regulatory compliance and passenger safety
ASSA ABLOY solution: Digital cabinet locks help Helsinki Airport to improve regulatory compliance and passenger safety

Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is...