
HID ApproveHID
Simple mobile authentication & transaction signing
Vendor
HID
Company Website
iams-hid-approv…ile-app-ds-en_0.pdf
Product details
Robust Security Protocols Hardened Through Standards-Based Cryptography
HID Approve allows employees, contractors and customers to authenticate their access requests and sign transactions with their mobile device or PC. This can be achieved by either providing a secure code (OTP), scanning a QR code or responding to a push notification with a simple "swipe-to-approve" motion. HID Approve offers a comprehensive range of security policy customizations, suited to each organization’s unique risk-profile. This enables organizations to strike a better balance between security and usability.
Different Ways to Implement HID Approve
- Scan-to-Approve — Simplify authentication with a QR code ensuring secure access through a quick scan and swipe, eliminating the need for user IDs
- Push Notification — Authenticate seamlessly through push notifications and a simple swipe-to-approve motion, offering a smooth user experience and convenience without compromising on security
- Secure Code/OTP — The classic and widely adopted option of using Secure Code (OTP) ensures secure access, even when the authenticator is offline
What Sets Us Apart
- Seamless User Experience — An easy-to-integrate solution that is simple and intuitive to use
- Compliance Made Easy — Facilitates organizations to meet regulations around the world with highly customizable security and data protection privacy
- Unparalleled Security — Strict adherence to industry-recognized security best practices, including robust protocols hardened through standards-based cryptography backed by third-party penetration testing
- Low Cost of Ownership — No need to publish and maintain a bespoke standalone app
- Flexible Deployment — Choice between a mobile app or SDK