The World of Multi-Credentials: Which System Is Right for Your Customer?

As security breaches and hacks are being reported daily, there is a growing awareness of the fallibilities of conventional security technologies and a heightened demand for better methods of access control. Locksmiths recall the bump key episodes...


The HID on the Desktop™ solution — comprising access control cards, OMNIKEY® contact and contactless card readers, and naviGO™ management software — provides a cost-effective, user friendly solution for a strong security posture.

HID on the Desktop provides varying levels of risk-appropriate security solutions to suit an organization’s risk tolerance and budget. For instance, card technology ranges from basic two-factor authentication (card and PIN) to a higher level of network security that uses Public Key Infrastructure (PKI) and digital certificates.

Another factor that is forcing security upgrades is the rise in regulatory and compliance requirements.

HID on the Desktop leverages the physical access ID cards that most organizations already have and use on a daily basis. Organizations are accustomed to provisioning and managing these cards, and users are accustomed to carrying them, facilitating the transition to two-factor authentication on laptops and at the desktop.

Crescendo smart cards are PKI-enabled. Just below Crescendo is iCLASS, a contactless smart card. iCLASS secures the session with encryption and mutual authentication. Finally, users looking for a simpler, yet still strong, two-factor authentication strategy can make use of the widely deployed Prox contactless smart card. All of these options, which fall on a continuum of strong authentication security, are far more secure than username and password.

All HID cards work in conjunction with HID’s OMNIKEY contact or contactless card readers, available in a variety of form factors to suit the needs of nearly any application. naviGO software reads a user’s card and requests his/her PIN. If the user can’t remember that information, he or she is provided an emergency portal that features steps to securely retrieve it via knowledge-based authentication (KBA). This self-service approach eliminates the need for IT to get involved and reduces the cost that can be incurred by password resets in terms of IT time and loss of user productivity.

Organizations can also use HID on the Desktop to set and enforce automated centralized access policies for on-site and remote users. These policies tie into Microsoft’s ActiveDirectory via naviGO so organizations can easily track and audit individual user activity to comply with industry and government mandates.

For more information on HID multi-credential products, visit www.hidglobal.com.

 

Schlage AptiQ

The threat of proximity credential cloning in an environment where reasonable security management policy is in force is very real. All it takes to clone a card is a very inexpensive device that can be ordered over the Internet. Nobody would know that a cloned card was being used.

With a multi-technology reader being installed at every new door, organizations are able to flexibly plan for the future, using their present proximity cards today and migrating to smart cards when budgets and time allow. They can upgrade on their preferred timelines, not due to the whim of technology that forces a “now or never” alternative.

Smart cards can be used in diverse applications such as access control, cashless vending, meal programs and transit applications because of their ability to read data from and write data to the card. Smart cards also employ advanced security features that make them an ideal candidate for both high security applications and those in which important data or financial information will be transmitted.

AptiQ covers all of the applications in which proximity works plus high security applications, situations requiring data storage, where protection of high value areas or information is needed and in scenarios requiring multiple credential applications.

The aptiQ smart card is designed on an open architecture platform and can be used both in access control systems manufactured by Ingersoll Rand, as well as third party systems.

There are three basic form factors: clamshell cards, ISO Cards, and an adhesive PVC patch. Within those three form factors, Schlage offers the following 12 types:

We Recommend