{"id":286,"date":"2010-10-27T18:49:25","date_gmt":"2010-10-27T16:49:25","guid":{"rendered":"http:\/\/www.identitycosmos.com\/?p=286"},"modified":"2010-10-27T18:49:25","modified_gmt":"2010-10-27T16:49:25","slug":"activeidentity-hid","status":"publish","type":"post","link":"https:\/\/identitycosmos.com\/index.php\/2010\/10\/27\/activeidentity-hid\/","title":{"rendered":"ASSA ABLOY r\u00e9alise l&#8217;acquisition d&#8217;ActiveIdentity"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-287\" title=\"ActiveIdentity_logo\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2010\/10\/ActiveIdentity_logo.jpg\" alt=\"ActiveIdentity_logo\" width=\"182\" height=\"34\" \/> ASSA ABLOY, maison m\u00e8re de <a href=\"http:\/\/www.hidglobal.com\/\">HID Global<\/a> renforce sa position dans le domaine de la gestion des identit\u00e9s et des acc\u00e8s en r\u00e9alisant l&#8217;acquisition de la soci\u00e9t\u00e9 ActiveIdentity. ActiveIdentity propose des solutions dans les domaines suivants:<\/p>\n<p><span style=\"text-decoration: underline;\"><strong># Strong Authentication<\/strong><\/span><br \/>\nProminently featured in several Gartner research reports (e.g., \u201cMarketScope for Enterprise Broad-Portfolio Authentication Vendors,\u201d published in April 2009; and \u201cMarket Overview: Authentication,\u201d published in September 2008), the ActivIdentity Strong Authentication suite of products enables organizations to securely address a variety of end-user access control scenarios, ranging from remote access via virtual private networks (VPN) and secure access to Web-based applications, to secure access to data and applications from the local network.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong># Credential Management<\/strong><\/span><br \/>\nActivIdentity Credential Management products enable organizations to securely deploy and manage smart cards and USB tokens containing a variety of credentials, including public key infrastructure (PKI) certificates, one-time passwords, static passwords, biometrics, demographic data, and virtually any other application.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong># Security Clients<\/strong><\/span><br \/>\nActivIdentity Security Clients software extends ActivIdentity strong authentication and credential management offerings by either enabling the use of smart cards and smart USB tokens for a wide variety of desktop, network security, and productivity applications or enhancing the productivity of employees with easy single sign-on capabilities to network resources.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong># Authentication Devices<\/strong><\/span><br \/>\nRounding out the ActivIdentity product portfolio, ActivIdentity Authentication Devices provide organizations with a one-stop shop experience. Organizations can choose from a broad range of authentication devices (e.g., smart USB tokens, one-time-password tokens in a variety of form factors, soft tokens, display cards, and smart cards) and accessories (e.g., smart card readers and hardware security modules) to complement their strong authentication and credential management solution.<\/p>\n<p>Avec un tel panel de solutions, <span style=\"color: #0000ff;\"><strong>ASSA ABLOY \/ <\/strong><\/span><span style=\"color: #0000ff;\"><strong>HID Global se positionne comme un des leaders dans le domaine de la gestion des identit\u00e9s et des acc\u00e8s<\/strong><\/span>, positionnement d\u00e9j\u00e0 amorc\u00e9 avec la sortie de l&#8217;offre &#8220;<a href=\"http:\/\/hid.cerberis.com\/Solutions\/hid-CouplageAcces.html\">HID On The Desktop<\/a>&#8221;\u00a0 et le d\u00e9veloppement des offres <a href=\"http:\/\/hid.cerberis.com\/Produits\/hid-crescendoCard.html\">Crescendo <\/a>et <a href=\"http:\/\/www.hidglobal.com\/main\/card-issuance\/printer-and-encoders\/\">Fargo<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ASSA ABLOY, maison m\u00e8re de HID Global renforce sa position dans le domaine de la gestion des identit\u00e9s et des acc\u00e8s en r\u00e9alisant l&#8217;acquisition de la soci\u00e9t\u00e9 ActiveIdentity. ActiveIdentity propose des solutions dans les domaines suivants:<\/p>\n<p># Strong Authentication<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[112,124,216],"class_list":["post-286","post","type-post","status-publish","format-standard","hentry","category-business","tag-hid","tag-interoperabilite","tag-securite"],"_links":{"self":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/comments?post=286"}],"version-history":[{"count":0,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/286\/revisions"}],"wp:attachment":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/media?parent=286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/categories?post=286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/tags?post=286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}