Access Control

HID Approve

by Mark Rowe

HID Global, the identity and access control product company, has announced a new app, HID Approve. The ID product firm says it turns a mobile device into a handheld validation device or “authenticator” that verifies online access and transaction requests, such as digital banking transactions or corporate VPN access.

The HID Approve mobile app combines public key-based cryptography and push technology to create a new experience for customers of banks, retailers and healthcare providers as well as between employees and enterprise or organisations. This allows customers to have more control over who is accessing their confidential and proprietary information, the product developers say. HID claims this new software-based solution is more intuitive and user-friendly compared to traditional methods of authentication, and helps increase cybersecurity.

Brad Jarvis, Vice President and Managing Director, IAM Solutions with HID Global, said: “HID Approve will transform secure digital transactions in ways similar to what Uber did for car service and mobile keys did for hotel check-in. HID Approve significantly simplifies and empowers consumers to better protect their finances, reduce fraud and have greater peace of mind.”

HID Approve is enabled by HID Global’s ActivID Authentication infrastructure. Every time a transaction or access is attempted online, the ActivID Authentication system uses push technology to send a notification to the consumer’s mobile device to ask them to approve the transaction or log-in attempt. The user then swipes right to accept it or left to reject for verification.

HID Approve has multiple deployment options:

Turnkey application that is fully managed by HID Global and easily customisable, so organisations can present their brand without the need to build and maintain a custom app; and Software Development Kit to integrate HID Approve capabilities into existing corporate apps.

“HID Approve is a strong addition to an already robust identity management portfolio, which includes solutions that cover the entire identity lifecycle and the authentication technology and devices to ensure that the right people access the right information, including tokens, smartcards, and biometrics – and now push technology,” Jarvis added.

Related News

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing