Download PDF version Contact company

HID Global, global provider of trusted identity solutions, has announced that its HID Approve mobile authentication application was awarded New Product of the Year at the Info Security Global Excellence Awards gala ceremony during RSA 2018 in San Francisco.

Cryptography And Mobile Push Notifications

HID Approve is a next-generation multi-factor authentication solution that combines the security of public key-based cryptography with the convenience of mobile push notifications, and that delivers a simple and secure way for users to authenticate and verify their transactions. Financial institutions have already discovered that HID Approve is a groundbreaking technology redefining user authentication for mobile banking"The ability to brand it accordingly to enterprise, banking or healthcare provider needs raises the attractiveness for the companies, while the ability to run multiple accounts on one device raises the experience for their users and employees with shared mobile workstations. 

HID Approve works in conjunction with the ActivID Authentication Server & HID Risk Management Solution that provides the supporting infrastructure and advanced Risk-Based Authentication capabilities to the application.

HID Approve Multi-factor Authentication

Financial institutions have already discovered that HID Approve is a groundbreaking technology redefining user authentication for mobile banking, but this New Product of the Year award at RSA speaks to the innovation that HID is delivering to enterprise & healthcare organizations who are continuously trying to improve security and user experience for their users,” said Martin Ladstaetter, Vice President of Product Management, Identity & Access Management Solutions with HID Global.  “We are honored that HID Global is recognized as one of the leading innovators for identity and access management.

HID Global has one of the broadest portfolios of identity and access management products and services, ranging across multi-factor authentication, physical identity and access management, credential management, digital signing and digital encryption.

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How Do New Security Technologies Transform Retail And Loss Prevention?
How Do New Security Technologies Transform Retail And Loss Prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...