HID® iCLASS® 200x iCLASS

Smart card for direct image and thermal transfer iCLASS smart card technology was specifically designed to make access control more powerful, more versatile, and more secure when compared with legacy 125 kHz frequency technologies. iCLASS 13.56 MHz read/write contactless smart card technology provides versatile interoperability in applications such as access control, network log-on security, cashless […]

HID® FlexSmart™/MIFARE® DESFire® EV1 1450 Card

13.56 MHz ISO thick photo imageable MIFARE DESFire EV1 smart card Designed to help organizations improve their credential-based security and maximize value from their credential investment by adding multiple applications, these secure Genuine HID smart card products address emerging requirements for MIFARE DESFire EV1 smart card technology. Suitable for adding MIFARE DESFire EV1 smart card […]

HID Crescendo® Smart Card Series

Enhance security with smart cards that support FIDO2, PKI, OATH and physical access technologies Crescendo Cards  Crescendo provides organizations with seamless and secure employee authentication, ensuring that only authorized people can access sensitive information. Crescendo Cards offer strong multi-factor authentication (MFA) through a single corporate ID badge to access both facilities and digital enterprise resources. […]

HID Crescendo® Key™ Security Key Series

Keys for strong multi-factor and passwordless authentication with support for FIDO, PKI and OATH Crescendo Keys Crescendo Keys help organizations to improve their security posture, comply with industry mandates and improve the user experience by providing proven, strong authentication for employees accessing corporate networks, applications and data. Designed to be easy and fast to deploy, the […]

HID® ActivID™ One-Time-Password (OTP) Token

Portable, easy-to-use One-Time-Password (OTP) Tokens to strengthen their access security One-Time Password (OTP) Tokens from HID go beyond simple, static passwords to provide organizations an easy way to increase trust in a user’s identity and grant them appropriate access. When users need a network, system or cloud-based application, they simply use the combination of something […]