Strong Authentication Devices - Smart Cards, OTP Tokens

By: Actividentity  09-12-2011
Keywords: Security, smart card, Smart Cards

Business Drivers for Authentication Devices

  • More Sophisticated Hackers:  50% of data breaches exploit stolen or weak credentials
  • Moving Beyond Traditional OTP: Multiple layers of defense are now necessary to inhibit the compromise of credentials
  • Securing Windows Login: Smart cards provide the only two-factor authentication option for Windows login.

ActivIdentity gives organizations the flexibility to deploy any combination of authentication devices that best meet their specific business, security, and budget requirements. Solutions include , , , , , and to . Smart cards enable secure storage for credentials and support a wide variety of use scenarios. ActivIdentity also offers a broad range of smart card readers. Our USB Tokens provide strong security in an easy-to-use, portable form factor that has the same two-factor authentication, digital signature, and encryption capabilities as a smart card. ActivIdentity one-time password (OTP) tokens generate random passwords that cannot be reused and the end user experience is as simple as using an ATM machine. DisplayCard Tokens are credit card-sized solutions that quickly and easily generate and display an OTP on the card. Soft Tokens provide a simple and efficient solution for the distribution, activation, and reuse of tokens for strong authentication. ActivIdentity partners with the leading vendors in application and transaction security to offer hardware security modules.

ActivIdentity Authentication Devices provide the following key benefits:

  • Increases productivity byoffering secure connectivity from any location through a variety of devices and authentication methods
    • Reduces token replacement and administrative costs with two to three times the longevity of competitors’ products
    • Decreases risk via robust two-factor authentication, which inhibits breaches
    • Improves controlby employing a fully interoperable, OATH-standards-based authentication and a wide range of authentication devices 

Keywords: Authentication Devices, Data Breaches, Hardware Security, Security, smart card, Smart Cards, Usb Tokens,

Other products and services from Actividentity


PKI Digital Certificate Validation - Corestreet Software

The ActivIdentity CoreStreet suite of PKI certificate validation products is a complete solution that allows for the secure, scalable and reliable validation of digital certificates using both traditional as well as distributed OCSP, and this for certificate populations of any size.


Information Security Clients - Smart Card Authentication

Escalating Costs: Price Waterhouse Coopers found that the frequency of cyber attacks on enterprises doubled in the last 18 months and the cost tripled. Insider Threats: Insider security breaches pose a far greater risk to organizations and attacks on information assets are growing. ActivIdentity Security Clients provide the following key benefits.


Access Control - PIV Credentials, Smart Card Readers

To establish standards and guidance for HSPD-12, the National Institute for Standards and Technology has published the Federal Information Processing Standard 201 and several Special Publications that apply to all government agencies. ActivIdentity ActivEntry and ActivEntry Mobile SDKs.


Credential Management - Digital Certificate Authentication

Ineffective passwords: Static passwords are ineffective; broader use of strong authentication and multiple layers of defense are necessary to inhibit the compromise of credentials. The extends the basic enrollment functionality of ActivID CMS for organizations that need to comply with more advanced PIV standards. For a rapidly deployed PIN management and smart card issuance solution, the is easy to use and provides accelerated time to benefit.


Strong Authentication - Multi-Factor Identity Assurance

Many industry standards and government regulations now deem static passwords as inadequate and establish guidance that multi-factor authentication should replace single-factor authentication. Broad support of authentication devices and authentication methods that provide user convenience and address a variety of risk levels for organizations.


Authentication Devices, Access Control, Credential Management

ActivIdentity Credential Management products enable organizations to securely deploy and manage smart cards and USB tokens containing a variety of credentials, including public key infrastructure certificates, one-time passwords, static passwords, biometrics, demographic data, and virtually any other application.


Services Overview - ActivIdentity

To ensure end-to-end project ownership and responsibility, ActivIdentity has integrated and streamlined its Pre-Sales activities with the rest of its project delivery related services to create the Customer Engagement Methodology. ActivIdentity Pre-Sales provides large customers and partners with the facts and tools they need to make informed decisions when they select and purchase Identity Assurance technology.