Download PDF version Contact company

HID Global, worldwide supplier of trusted identity solutions has announced that its award-winning HID Mobile Access solution is one of the industry’s first mobile access offerings to be ISO 27001 certified. A widely-known and accepted international security standard, ISO 27001 serves as an information security management systems framework that specifies security best practices, establishes controls to manage risk and protects data. 

HID Mobile Access

Being a pioneer of ISO 27001 certification for using mobile devices to open doors is part of the move towards mainstream adoption of HID Mobile Access,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control Solutions with HID Global. “This prestigious certification is evidence of HID’s ongoing commitment to achieving the high standards of information security for our cloud-based services.

HID has already been leading the industry in technology development and deployments for mobile access, powered by Seos credential technology. With the ISO certification, HID is at the forefront in standards compliance, too.

Integrate Access Control

Users can rely on HID Mobile Access to securely access doors, gates, enterprise resources and more with their smartphone, tablet, wearable or other mobile device. Plus, the solution is a linchpin for organizations seeking to integrate access control into smart building technologies and services in order to create more convenient, intuitive experiences for users.

ISO 27001 is performed by independent third-party auditors. Achieving the accredited certification provides independent, expert validation that HID maintains the confidentiality, integrity and availability of customers data in accordance with international, industry-leading security practices. ISO 27001 is supported by its code of practice for information security management, ISO/IEC 27002:2013.

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How Do New Security Technologies Transform Retail And Loss Prevention?
How Do New Security Technologies Transform Retail And Loss Prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...