16 Integrations with HID IdenTrust

View a list of HID IdenTrust integrations and software that integrates with HID IdenTrust below. Compare the best HID IdenTrust integrations as well as features, ratings, user reviews, and pricing of software that integrates with HID IdenTrust. Here are the current HID IdenTrust integrations in 2024:

  • 1
    Microsoft 365

    Microsoft 365

    Microsoft

    Introducing Microsoft 365 (formerly Microsoft Office 365). Be more creative and achieve what matters with Outlook, OneDrive, Word, Excel, PowerPoint, OneNote, SharePoint, Microsoft Teams, Yammer, and more. With a Microsoft 365 subscription, you get the latest Office apps—both the desktop and the online versions—and updates when they happen. On your desktop, on your tablet, and on your phone.* Microsoft 365 + your device + the Internet = productivity wherever you are. OneDrive makes the work you do available to you from anywhere—and to others when you collaborate or share. Help at every turn. Email, chat, or call and talk to a real live person. Get Office today—choose the option that's right for you
    Leader badge
    Starting Price: $5 per user per month
  • 2
    Actin Time

    Actin Time

    Actin Time

    ActIn Time is a feature-rich software suite that grows with your business. No other system gives your more value for money. With the uncompromising quality of sales, service, and support at unbeatable prices, thousands of ActIn Time users swear by it! For those wanting a quick and easy online solution without the hassle of setting up and installing hardware. Get your company up and running with ease. Suited for small to medium-sized companies who prefer a complete solution with onsite setup and face-to-face training. Self install also available. Medium to large companies to encompass all aspects of the ActIn Time Suite for future company growth with no software restrictions. Your data is your most important asset. You should entrust it only to the best professionals. The answers to your issues and queries are only a phone call away. All team members at ActIn Time have been trained thoroughly to assist in any situation providing you with the comfort and reassurance you need.
    Starting Price: Free
  • 3
    CipherCloud

    CipherCloud

    CipherCloud

    The CipherCloud CASB+ platform provides deep visibility, end-to-end data protection, advanced threat protection, and comprehensive compliance capabilities for enterprise embracing cloud-based applications. CipherCloud CASB+ provides industry-leading tokenization, encryption, and comprehensive key management with the flexibility to address any mix of security requirements. Our data protection, data loss prevention, native device management, secure offline data access, automated PII anonymization, and HSM support are available in one scalable platform. CipherCloud CASB+ brings advanced protection to identify and stop threats that are being shared through cloud-based services. This includes capabilities such as adaptive access control, user and entity behavior analytics (UEBA), and virus/malware protection. CipherCloud CASB+ delivers complete visibility for your organization’s cloud usage. The cloud discovery and deep analysis quickly reveal shadow IT activity.
  • 4
    Delinea Cloud Access Controller
    Gain granular control over web applications and web-based cloud management platforms. Delinea's Cloud Access Controller provides a comprehensive PAM solution that operates at cloud speed and is quick to deploy and secure access to any web application. With Cloud Access Controller, you can easily integrate your existing authentication solutions with any web application without having to write any additional code. Apply granular RBAC policies that enforce least privilege and zero trust initiatives, even to custom and legacy web applications. Specify what an individual employee is allowed to read or modify within any web application. Grant, manage and revoke access to cloud applications. Specify who gets access to what, at a granular level. Track usage of each and every cloud application. Clientless session recording without agents. Secure access to all web applications, including social media, custom, and legacy web applications.
  • 5
    Junos Traffic Vision

    Junos Traffic Vision

    Juniper Networks

    Junos Traffic Vision is a licensed traffic sampling application for MX Series 3D Universal Edge Routers. It provides details on network traffic flows that is useful for a wide variety of operations and planning activities. Junos Traffic Vision monitors packets as they are processed by the router, and captures details such as source and destination addresses, packet and byte count information. These details are aggregated and exported in a standards-based format for analysis and presentation by Juniper and third-party-based tools that support usage-based accounting, traffic profiling, traffic engineering, attack and intrusion detection, and SLA monitoring. Implemented inline and on service cards that provide high performance and scale, Junos Traffic Vision can be deployed in both active and passive configurations and can take place alongside lawful intercept filtering and port mirroring without impacting performance.
  • 6
    AppVision™

    AppVision™

    Prysm Software

    AppVision™ is a PSIM platform for security, safety and technical management systems. Open, scalable and neutral, it guarantees the integration and control of equipment and applications in a single interface. Whatever the size or complexity of the project, AppVision™ guarantees a return on investment. Through the transfer of skills provided by our trainers, our partners can deploy and develop the solution in complete autonomy. This independence thus guarantees that the solution meets the current and future needs of end clients. We are independant from the systems that we integrate. Our partners are thus free to choose their equipment. AppVision™ is 100% customizable, providing GUI features and extensions. Our partners realize these customizations in total autonomy. They can create their own OEM version to ensure that the platform best suits their market and their customers. We focus on the integration and interaction capacity of AppVision™.
  • 7
    ERMES: Easy Reporting Matrix basEd Solution
    The complete application, conceived from the experience of the SEFIN group, for supervisory reports and matrixes for branches of foreign banks in Italy and Financial Intermediaries of the new SINGLE REGISTER. ERMES is the complete application, protocol to PUMA 2 (Unified Corporate Matrices Procedure) to manage in a simple and complete way the periodic reporting obligations to the Bank of Italy. Conceived and developed to meet the specific needs of the Italian branches of foreign banks , of the Financial Intermediaries pursuant to art. 107 and today Financial Intermediaries pursuant to art. 106 (so-called SINGLE REGISTER), ERMES is a reporting, reporting and communication system with the Bank of Italy, which guides the user in all phases thanks to a simple but complete interface. Flexibility and usability. Adaptability and customization of the table structures for each individual user. Uniqueness of the reference documentation for the processing.
  • 8
    Nymi

    Nymi

    Nymi

    A connected workforce is transformed with safe, secure, and simple applications. Transform access across the enterprise with biometrics, Zero Trust, and nonrepudiation made easy on one secure workplace wearable. Sign off on critical processes with stronger data integrity and identity assurance. Our standards-based approach and vast partner network means we connect to your existing infrastructure. Nymi’s workplace wearable, the Nymi Band, provides organizations with a platform to achieve zero-trust security principles and biometric authorization with the additional ability to solve a variety of challenges that impact productivity, compliance, health/safety, and culture. As part of its diverse, global enterprise customer base, Nymi serves the world’s largest enterprises with deployments across 15 countries to deliver data integrity and security, allowing highly regulated industries to achieve compliance securely and efficiently.
  • 9
    Acceptto Zero Trust Identity (CIAM)
    You need to know that your customers are who they say they are, customers don’t want to jump through hoops to prove it and they want you to keep their credentials safe. Protect your customers identities through a delicate balance of security and a frictionless, pleasant customer experience. Real-time, continuous identity monitoring & validation Post-Authorization. Eliminate account takeover (ATO) instantly with intelligent MFA. Risk-based policy orchestrated continuous authentication. Acceptto is a transformative cybersecurity company driving a paradigm shift in identity access management by treating authentication not as a single event, but rather a continuum. Our AI/ML powered Passwordless Continuous AuthenticationTM technology analyzes and verifies user identity, inferring behavioral data to detect anomalies and eliminate dependence on vulnerable binary authentications. We deliver the smartest, most resilient and breach-proof identity validation technology.
  • 10
    Intercede

    Intercede

    Intercede

    MyID® credential management software enables governments and large enterprises to issue and manage digital identities using the most secure method of multi-factor authentication to citizens, large workforces and supply-chains. Today, MyID enables the strong authentication of millions of people to the data, systems and networks they need access to. For those responsible for information security, MyID provides easy integration and control over digital identity issuance and management. For end users, whether citizens or employees, MyID enables seamless, secure access to company systems, networks and resources using multi-factor authentication via a variety of devices. Faced with ever increasing threats of cyber terrorism, identity fraud and crime, MyID® provides a cyber secure credential management software solution. Where data really matters, you will find MyID. The security, reliability and interoperability of MyID software sets it apart.
  • 11
    Cohesion

    Cohesion

    Cohesion

    Cohesion empowers real estate owners to maximize asset and portfolio value in a secure manner with all building systems, workflows and people seamlessly connected into one intelligent building platform. Seamless and sophisticated, Cohesion Experience delivers the best-in-class experience to tenants while improving health, wellness, and efficiency. Communicate with tenants, build community, promote in-building retail, and provide transportation options. Increase efficiency and productivity with smart controls throughout your building. Streamline manual tasks and reduce spreadsheets used by operations teams while offering digital tools for tenants. Working directly with your building systems, Cohesion Intelligence gives you access to untapped data. You get comprehensive insights on how to maximize your ROI and ensure demand-driven operations. View actionable insights to inform planning and decision-making through query tools and dashboards.
  • 12
    VisitorWatch

    VisitorWatch

    DATAWATCH SYSTEMS

    A full-featured visitor management system that enables tenants, property managers, and security personnel to conveniently and efficiently identify, register and track visitors. Authorized users can pre-register visitors and register unscheduled visitors. Supports a driver’s license reader, passport scanner, digital camera and badge printer. Badges can be limited to specific turnstiles or readers to support tracking and security checks. Badges automatically expire at a designated date and time. Access deny list enables tenants and property managers to list people not authorized to enter a building. The system notifies the guard if anyone not authorized attempts to obtain a badge. Tenants can remotely view and search turnstile/reader history and visitor records, scheduled visitors, processed visitors, building fire wardens and non-authorized individuals. Design custom badge templates for buildings and tenants.
  • 13
    VideoWatch

    VideoWatch

    DATAWATCH SYSTEMS

    Video is an integral part of a modern security solution, providing real-time surveillance and the ability to investigate incidents through analysis of recorded footage. Cloud-based hosted video (VideoWatch®) provides a live view from any online device with 24/7 service. Guaranteed secure cloud-based video storage. Monitor the health of cameras and video servers. Export and save encrypted video clips at any time from anywhere. Smart cameras, HD quality and efficient search capabilities. Depending on your business needs we offer multiple products from a smartphone app for streaming video to more advanced video services designed to manage footage and support your security requirements. All characteristics you require your preferred service providers to have in our industry. Datawatch is leading the way in access control. As an industry leader, we develop customized systems that keep our clients’ businesses and employees safe and secure.
  • 14
    NetSeT Global Solutions

    NetSeT Global Solutions

    NetSeT Global Solutions

    NetSeT Global Solutions is an IT company that develops complex information systems for citizen data management. We have more than 20 years of experience, references in more than 15 countries on 4 different continents, and over 20 systems installed in the region. We represent a regional leader in the field of electronic identification, eGovernment, and specialized systems for secure communication. With its headquarters in Belgrade (Serbia), NetSeT contains a group of engineers who are experts in the field of data protection, the design of high-performance scalable systems, and software development using the most advanced tools. We are exceptionally proud of all of our team members since their hard work provides tens of millions of citizens with secure data management and guarantees a well-established level of quality of our products. The platform enables you to digitalize your processes, making them much more accessible, modern, and economic.
  • 15
    New Era

    New Era

    New Era Technology

    Facilitate modern workplaces with world-class collaboration and unified communication services. New Era provides communication solutions that streamline and integrate a vast array of collaboration and UC technologies, including audio visual technology, telephony, audio conferencing, web conferencing, video conferencing, unified messaging, instant messaging, digital signage, and more. We offer a complete end-to-end managed service for your entire unified collaboration environment. By empowering organizations to support their users from any location and device, we help drive productivity and achieve better business outcomes, ensuring users get the very best collaboration experience, enabling them to operate effectively regardless of whether they sit on-site or remote. Our vendor-agnostic approach allows us to integrate and manage multiple vendors and collaboration technologies. Let’s build a personalized service to meet your company’s communication needs.
  • 16
    Equiem

    Equiem

    Equiem

    We've brought our tenant experience, building operations, and data analytics solutions onto a single platform to make your asset more manageable and more human. Equiem One is a simpler way to manage and engage with your commercial property, built upon three pillars of Experience, Efficiency, and Intelligence. The Equiem experience is one you don’t even need to think about. You feel it every day in the ease with which you interact with your building. From building and portfolio managers to individual occupants, Equiem One makes the workplace experience seamless. Save time, cut costs, and locate hidden opportunities as you manage your property. Control all your facility operations in Equiem One's backend – from access control and flex space to eCommerce. Truly understand your tenants’ wants and needs – and how to meet them – with Equiem’s robust data and analytics capabilities. Use solid intelligence to create grounded, intentional strategies that are destined to succeed.
  • Previous
  • You're on page 1
  • Next