sb-as logo
Story image

HID Global brings high authentication to mobile

29 Nov 2018

HID Global, a provider of identity solutions, has released the Crescendo Mobile smart card offering to bring convenience to high security for accessing computer, network or cloud applications.

The new HID mobile smart card utilises digital certificates on users’ mobile devices for client authentication.

The HID Crescendo Mobile solution provides organisations seeking to eliminate passwords with a solution that combines the high security of physical authenticators with the usability of a mobile solution.

Crescendo Mobile works similarly to and is compatible with highly secure Crescendo smart cards. However, rather than inserting a separate device into a contact smart card reader, it connects to a desktop computer via an NFC (near-field communication) reader or Bluetooth.

“End users and IT personnel alike have been clamouring for a highly secure solution for enabling secure access to networked assets that can utilise what people are already carrying, namely their mobile devices,” says HID Global IAM solutions vice president and managing director Brad Jarvis.

“A key to ensuring security protocols are followed is to ensure that they are as easy to use as possible. The ubiquity of mobile phones, tablets and the like make them an obvious choice to become part of the security system.”

The Crescendo Mobile app can be downloaded onto Android or iOS devices and the IT team can distribute secure cryptographic credentials to users without the need or expense of shipping smart cards or smart card readers.

The solution is particularly cost-effective to deploy for contractors and remote users.

Day-to-day usage scenarios for HID Crescendo Mobile include:

  • Allowing a user to log on and unlock a Windows workstation to access cloud applications, VPNs, desktop applications and Microsoft Active Directory.

  • When the user walks away, Crescendo Mobile App automatically locks the workstation down.

  • End users can use their phone to carry the keys and digital certificates needed to digitally sign email, Microsoft Office and Adobe Acrobat documents.

  • Ensure sensitive data confidentiality by requiring the phone to access encrypted email messages or files using Windows EFS file encryption.

The Crescendo Mobile app is available for Android 7 or later in Google Play and for iOS 11 or later in iTunes App Store.

Story image
Why zero trust could fail due to lack of understanding​, not technology
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture for protecting their sensitive resources.More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Story image
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Story image
Creating private data regulations for employees
Whether employees are hired on a part-time or full-time basis, everyone must know about data privacy regulations. Everyone needs to be responsible for keeping the organisation’s data secure. More
Download image
NFV: The ticket to stronger, simpler corporate networks
It's a big industry - but what exactly is NFV?More