HID Global Identity and Access Management - Short Review

Security Tools



Overview

HID Global’s Identity and Access Management (IAM) suite is an end-to-end solution that enables organizations to securely manage user identities and access to various assets, including workstations, facilities, cloud applications, servers, and networks. This suite is particularly suited for critical industries such as financial services, healthcare, aviation, and government, where high levels of security and compliance are paramount.



Key Features and Functionality



Centralized Identity Management

The IAM suite provides a centralized platform to manage all aspects of user identity and access control. This includes onboarding, provisioning, and offboarding processes, ensuring smooth transitions and enhancing security and compliance.



Multi-Factor Authentication (MFA)

HID Global’s IAM includes an advanced zero-trust MFA solution that secures access to corporate networks, employee devices, VPNs, and cloud applications. The MFA supports various authentication factors, such as mobile push notifications, one-time passcodes, PKI-based smart cards, physical tokens, and biometrics. It also integrates with industry standards and protocols like FIDO, OATH, PKI, and OTP. Additional features include single sign-on capabilities and risk-based authentication.



Physical Identity and Access Management (PIAM)

The PIAM solution integrates physical and IT systems to automate the identity and access needs of the workforce, visitors, and extended identities. This integration streamlines the management of multiple identity types and access control systems, reducing manual interventions and associated costs and risks. PIAM ensures compliance with various regulations, such as HIPAA, Basel II, and FIPS 201, among others.



Credentialing and Authentication

HID Global’s IAM allows administrators to issue and manage high-assurance authentication credentials for both digital and physical access. This includes provisioning PKI certificates and other credentials to smart cards, physical tokens, USB keys, and mobile devices. These credentials can also be used for digital signing and data encryption, ensuring compliance with external regulators like the US Federal Government’s Personal Identity Verification (PIV) standard.



Mobile Access

The HID Mobile Access solution includes mobile-enabled readers, secure Mobile IDs, the HID Secure Identity Services Portal, and the HID Mobile Access App. Mobile IDs are provisioned over-the-air and use Secure Identity Object (SIO) data encoding for multi-layered security. The solution supports Bluetooth Smart and NFC communication standards and features a user-friendly app for simple enrollment and management of Mobile IDs.



Policy Enforcement and Compliance

HID SAFE Enterprise, part of the IAM suite, ties together corporate policy enforcement with identity management to ensure proper physical access and regulatory compliance. It integrates disparate systems, automates manual workflows, and provides an auditable compliance process. The solution uses real-time data collection and machine learning to predict workplace threats and enforce physical security policies efficiently.



Visitor Management

The HID Visitor Manager, a cloud-based identity and access management platform, unifies both physical access identities and cyber/IT identities. It allows for the digital transformation of cyber and physical security, compliance, and business challenges without the need for on-premise software installations.

In summary, HID Global’s Identity and Access Management suite offers a robust set of tools and features to secure and manage user identities, ensuring comprehensive security, compliance, and streamlined access management across various environments.

Scroll to Top