-
HID® TRISM™ Financial Instant Issuance Software
HID® TRISM™ Financial Instant Issuance (Fii) Software enables in-branch instant issuance and activation of payment cards. HID TRISM™ is a PCI-compliant, complete software package that runs on a local branch’s network, fully integrating with existing hardware and all on-site processors — AP, EFT and credit card.
In-branch instant card issuance drives higher activation rates and increased interchange revenue over slower-adopting competitors. HID TRISM seamlessly and securely automates the process of securely linking confidential customer account and core banking information to the card, allowing tellers and associates to place ready-to-use debit and credit cards into customer’s hands within minutes.
-
HID® ActivID® Authentication Appliance
HID Global’s ActivID® Authentication Appliance is used worldwide to secure access to critical infrastructure and data, so organizations can stay ahead of an ever-changing threat landscape without disrupting user workflow and productivity. The solution is easy to deploy and helps achieve compliance with industry mandates, policies and guidelines.
The ActivID Authentication Appliance supports multi-factor authentication with all leading mobile phones and tablets and provides a flexible platform that can grow with changing needs. Built-in support for open protocols ensures that it can be easily integrated into any enterprise infrastructure, cloud-based service and/or internet banking engine. It also supports advanced capabilities, such as the HID Approve™ app that enables mobile-based, out-of-band transaction verification and leverages mobile device “push” notification capabilities. Additionally, the HID Risk Management Solution is a threat and fraud detection solution that can enhance the functionality of the ActivID Authentication Appliance. Based on data analytics, it protects against traditional, as well as modern, threats targeting online and mobile banking, transaction systems and sensitive applications.
-
-
Mobile Authentication
Breakthrough Mobile TechnologyFrom unlocking doors to opening your world
Mobile authentication is the process by which a system, supporting mobile connectivity, verifies the identity of the user or other system who desires access via a mobile credential.
As more business is conducted on mobile devices like smartphones, tablets and wearables, organizations need to meet user demands for flexible access control and identity management—without sacrificing security and privacy.
-
Internet Of Things
Internet Of Trusted ThingsPioneering trusted digital identities to secure IoT applications
HID Global is a pioneer of securely connecting manufacturing and facilities equipment, medical devices, inventory, and many other physical assets to local and web-based business applications using identification and sensing technology. For decades, RFID transponders have been used across numerous industries to simplify inventory management and tracking and automate operational processes. HID Global’s visionary solutions continue to fuel limitless opportunities for partners and users; adding trust and security to enable novel Internet of Things (IoT) applications as part of HID Global’s commitment to innovation in a rapidly growing market.
-
Identity Management
Powering Trusted Identitiesof the world’s people, transactions, places, and things
From human resources to security to IT, digital and physical identity management can be staggering. We have created the world’s most comprehensive identity management platform — flexibly designed to protect your organization.
-
Extended Access Technologies
Unleash The Power Of Trusted IdentityAccess control solutions that move beyond the door
Extended Access Technologies widen the reach of HID trusted identity technology to secure enterprise, government, and personal authentication systems.
-
Citizen Identification
End-To-End Solutions For Governments
Securing physical and mobile identitiesAs the fastest growing solution provider in citizen identity, HID Global is challenging the status quo with its collaborative approach to solutions delivery. We are positioned to deliver complex, scalable and future proof government programs, while empowering local government and partners.
-
RFID Asset Tracking & Inventory Management
Industry-Leading RFID Technology
for reliable tracking of assets and activitiesAsset tracking enables companies to uniquely identify any object by affixing or embedding an RFID tag. RFID Tracked assets enable workflow optimizations, real-time inventory management or location services and help reduce human error.
-
Access Control IFDC
Model UIM
(Expansion Input Board)UOM
(Expansion Output Board)CPU 32 Bit Microprocessor Input Port 16 EA : Input Type Selectable
(4-State Supervised Input)2 EA : Input Type Selectable
(4-State Supervised Input)Output Port 2 EA :2 FORM C Relay Output (COM, NO, NC) 16 EA : 2 FORM C Relay Output (COM, NO, NC) Communication RS485 (Up to 4ea UIM and Up to 4ea UOM per 1 iFDC / iEDC ) LED Indicator 22 LED Indicators Power / Current DC 12V / Max.200mA DC 12V / Max. 450mA Dimension (W x H x T) 157mm x 137mm x 16mm 157mm x 185mm x 16mm Weight unit weight: 139.5g( 0.308lb) unit weight: 203g( 0.448lb) -
2 MP AHD 18x33x PTZ Camera With 120M IR
Resolution : 2 MP (1080p)Optical Zoom Lens : 18x/33xProgressive Scan CMOS : 1/2.8″IR distance : 120mrating : IP66
- Home
- Access Automation
- PREMISES SECURITY
- Smart Buildings
- Printers & Supplies
- Academy
- About Us
- Partners
- Contact Us