Download PDF version Contact company

HID Global, a global provider of trusted identity solutions, announced that its HID Crescendo PIV smart card has achieved FIPS 201 compliance and is listed on the General Services Administration’s Approved Products List (APL). Government agencies and private enterprises looking for the highest level of security and interoperability can leverage the Crescendo PIV smart card to protect the identities of their people when accessing facilities and IT systems.

GSA’s Approved Products List provides federal agencies with products and services that have been approved for FICAM implementation based on rigorous security vulnerability and interoperability testing performed by the FIPS 201 Evaluation Program. The Crescendo PIV also has a NIST FIPS 140-2 Level 2 security certification, in addition to the NIST FIPS 201 interoperability certification, and it has optimized performance for faster physical access using digital certificates.

Key Component To Multi-Factor Authentication Solutions

HID Crescendo PIV dual-interface smart cards enable access to a broad range of applications, including physical access, PKI based authentication, digital signature and data encryption

With the HID Crescendo PIV on GSA’s Approved Products List, government agencies have the assurance that the PIV card complies with governmental regulations for credentials,” said Yves Massard, Director of Government Solutions, IAM Solutions, HID Global. “HID continues to be a leader in providing PIV solutions to the U.S. federal government, delivering the security, interoperability, high performance and durability that government employees need.

HID Crescendo PIV dual-interface smart cards enable access to a broad range of applications, including physical access, PKI based authentication, digital signature and data encryption. Use cases include secure login to workstations and laptops, web-based cloud applications or VPN gateways.

HID Crescendo PIV is a key component to HID Express and HID PIV Enterprise, multi-factor authentication solutions that deliver standard-compliant identity and credential management for the complete lifecycle of the identity.

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How Do New Security Technologies Transform Retail And Loss Prevention?
How Do New Security Technologies Transform Retail And Loss Prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...