Services Overview - ActivIdentity

By: Actividentity  09-12-2011
Keywords: Credential Management

The ActivIdentity commitment to reducing your business risk extends well beyond delivering comprehensive strong authentication and credential management solutions. ActivIdentity also offers a variety of services from Pre-Sales and solution design to training and ongoing support. ActivIdentity helps ensure the success of customer deployments by offering the service options listed here.

ActivIdentity Pre-Sales provides large customers and partners with the facts and tools they need to make informed decisions when they select and purchase Identity Assurance technology.  To ensure end-to-end project ownership and responsibility, ActivIdentity has integrated and streamlined its Pre-Sales activities with the rest of its project delivery related services to create the Customer Engagement Methodology (CEM). 
ActivIdentity offers comprehensive packaged and custom best-practice Consulting Services to ensure that the deployment of ActivIdentity solutions meets your organization’s security, compliance, and vulnerability management needs while delivering the greatest return on investment.

The ActivIdentity Services continuum represents a holistic approach to services.

Keywords: Credential Management

Other products and services from Actividentity


PKI Digital Certificate Validation - Corestreet Software

The ActivIdentity CoreStreet suite of PKI certificate validation products is a complete solution that allows for the secure, scalable and reliable validation of digital certificates using both traditional as well as distributed OCSP, and this for certificate populations of any size.


Information Security Clients - Smart Card Authentication

Escalating Costs: Price Waterhouse Coopers found that the frequency of cyber attacks on enterprises doubled in the last 18 months and the cost tripled. Insider Threats: Insider security breaches pose a far greater risk to organizations and attacks on information assets are growing. ActivIdentity Security Clients provide the following key benefits.


Access Control - PIV Credentials, Smart Card Readers

To establish standards and guidance for HSPD-12, the National Institute for Standards and Technology has published the Federal Information Processing Standard 201 and several Special Publications that apply to all government agencies. ActivIdentity ActivEntry and ActivEntry Mobile SDKs.


Strong Authentication Devices - Smart Cards, OTP Tokens

Our USB Tokens provide strong security in an easy-to-use, portable form factor that has the same two-factor authentication, digital signature, and encryption capabilities as a smart card. ActivIdentity gives organizations the flexibility to deploy any combination of authentication devices that best meet their specific business, security, and budget requirements.


Credential Management - Digital Certificate Authentication

Ineffective passwords: Static passwords are ineffective; broader use of strong authentication and multiple layers of defense are necessary to inhibit the compromise of credentials. The extends the basic enrollment functionality of ActivID CMS for organizations that need to comply with more advanced PIV standards. For a rapidly deployed PIN management and smart card issuance solution, the is easy to use and provides accelerated time to benefit.


Strong Authentication - Multi-Factor Identity Assurance

Many industry standards and government regulations now deem static passwords as inadequate and establish guidance that multi-factor authentication should replace single-factor authentication. Broad support of authentication devices and authentication methods that provide user convenience and address a variety of risk levels for organizations.


Authentication Devices, Access Control, Credential Management

ActivIdentity Credential Management products enable organizations to securely deploy and manage smart cards and USB tokens containing a variety of credentials, including public key infrastructure certificates, one-time passwords, static passwords, biometrics, demographic data, and virtually any other application.