New handset-based secure credentials for network access from HID Global
29 November, 2018
category: Contactless, Corporate, Digital ID
HID Global launched its new Crescendo Mobile product to increase security for individuals accessing both local and cloud applications. It is, in essence, a virtual version of the Crescendo smart card that is stored on a mobile device. It shares digital certificates and required authentication data via an NFC or Bluetooth connection.
The Crescendo Mobile app is available for Android or iOS devices and once on a user’s device, secure cryptographic credentials can be deployed by a company’s IT department without the time or cost normally incurred when provisioning smart cards and readers
Many organizations are working to eliminate passwords from network access environments, and they want to add the security a physical authenticator. Smart cards have been an option, but in an increasingly mobile environment, cards add a dedicated item for users to carry. With Crescendo Mobile, the phone serves as the physical authenticator, but it is something the user is already carrying.
“A key to ensuring security protocols are followed is to ensure that they are as easy to use as possible,” says Brad Jarvis, Vice President & Managing Director, IAM Solutions, with HID Global. “The ubiquity of mobile phones, tablets and the like make them an obvious choice to become part of the security system.”
Deployment a handset-based secure credential is simple. The Crescendo Mobile app is available for Android or iOS devices and once on a user’s device, secure cryptographic credentials can be deployed by a company’s IT department without the time or cost normally incurred when provisioning smart cards and readers. The savings is particularly evident when deploying credentials for contractors and remote users.
When an authentication request is made, the user presents the phone and the credential is shared with the computer or device over the NFC or Bluetooth channel. It can be used to unlock workstations or to access cloud or desktop applications. When the user and his phone leave the workstation area, the access locks down. It is also ideal for signing and decrypting secure email.