It markets and sells its products and technologies through a worldwide direct sales force and through a network of partners, including system integrators, original equipment manufacturers, value added distributors, and value added resellers. For example, a system administrator could run a report which would determine that 20 percent of users are running Android, and 30 percent of those are using soft token version 4. Total number of current board members and advisors an organization has. This update enables soft token One-Time-Password OTP solutions to be easily controlled based on the type of OS and the version of the soft token to find the appropriate balance between security, convenience and cost. For example, a user could enable the usage of the soft token v. Thank you for your interest in our products.
|Date Added:||2 April 2014|
|File Size:||66.61 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
Easy to use, hard to lose security for any organization that requires the ultimate protection for their data and assets.
Sign up for a free Crunchbase account to follow and track organizations you care about. How can we help you?
ActivIdentity is headquartered in Silicon Valley, California. ActivIdentity is actively using 9 technologies for its website.
Contactez nous Ventes par courriel. ActivIdentity Corporation operates as a global company in authentication and credential management, providing solutions to confidently establish a person’s activdentity when interacting digitally.
PIAM simplifies control of all physical identities—from employees to visitors or vendors—across an organization. Total Product Changes The company addresses three identity management market segments: Senior Vice President, Worldwide Engineering. Software version actividetity which give users the ability see how many end-users they have from any type of operating system, or even the version of the soft token used.
Request Information I am looking for Date that the Funding Round was publicly announced. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist. CID hidden text field for keeping extra info: Board Members and Advisors.
Version control for any and all soft tokens. Lead Rating hidden possible values: The ActivID solution supports multi-factor authentication with all leading mobile phones and tablets.
No Search Results Please try again.
CoreStreet acquired by ActivIdentity. Available as a virtual appliance actividenttiy as hardware, the ActivID Appliance strikes the perfect balance between security, flexibility, cost and convenience.
ActivID Authentication Credential Management
Descriptive keyword for an Organization e. ActionType hidden this is actividrntity name of the Action that has been defined by IT when the form has been submitted. HID IdenTrust protects more than 6 billion payment transactions per year. When users need a network, system or cloud-based application, they simply use the combination of something they know e.
Where the organization is headquartered e. ActivIdentity is an authentication and credential management company providing identity solutions for digital interactions. From human avtividentity to security to IT, digital and physical identity management can be staggering. Number of Funding Rounds.
ActivID® Secure Multi-Factor Authentication
Design to Deployment Expertise HID Professional Services is the perfect way to ensure your strong authentication solutions are the most secure, compliant, and cost-effective way to protect your resources and data. The following fields are optional and should only be modified by the system administrator.
By adding in these control mechanisms, they can specify that users can only access data if they acividentity using a particular operating system, for example.
For more information, click here.