HID ActivClient Middleware For Smart Cards And USB Token
Technical Specification
- Make: HID
- Model code: ActivClient
- Reader Types: Smart Card
- Central / Remote Monitoring: Yes
- Import/Export of Information: Yes
HID ActivClient security application ensures strong authentication of employees, contractors and suppliers when they access enterprise resources to help IT managers, security professionals and auditors manage the risk of unauthorized access to workstations and networks. With ActivClient, organizations can go beyond simple passwords to deploy the best Identity Assurance solution for their environment – choosing from a range of credential options, including Smart Cards and USB Tokens, they can authenticate users to a wide variety of desktop, network, cloud and productivity applications. ActivClient consolidates identity credentials (private keys for public key infrastructure [PKI] certificates and symmetric keys for one-time password (OTP) generation) on a single secure, portable device.
Read moreMake | HID |
---|---|
Manufacturer | HID Global |
Model code | ActivClient |
Reader Types | Smart Card |
Central / Remote Monitoring | Yes |
Import/Export of Information | Yes |
Web-enabled software | Yes |
System Requirements | Operating System: Windows 2000, Windows XP, Windows Vista, Windows 7, Windows Server 2003, Windows Server 2008, Windows Server 2008 R2 (32- and 64-bit) |
Additional info | HID ActivClient security application ensures strong authentication of employees, contractors and suppliers when they access enterprise resources to help IT managers, security professionals and auditors manage the risk of unauthorized access to workstations and networks. With ActivClient, organizations can go beyond simple passwords to deploy the best Identity Assurance solution for their environment – choosing from a range of credential options, including Smart Cards and USB Tokens, they can authenticate users to a wide variety of desktop, network, cloud and productivity applications. ActivClient consolidates identity credentials (private keys for public key infrastructure [PKI] certificates and symmetric keys for one-time password (OTP) generation) on a single secure, portable device. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The 2020 State of Physical Access Control Report
Financial Institutions Require Future-Ready Physical Security Technologies
Physical Security Supports A Future-Proof Cyber Security Strategy
The Role of Access Control in a Safe Return to the Workplace
DownloadPhysical Access Control In Higher Education
DownloadA Brief History of Access Control Credentials
DownloadHow Open Supervised Device Protocol (OSDP) is Revolutionizing Access Control Systems
Download