• 0Shopping Cart
CyberArmed
  • Products
    • IdExchange
    • Credential Management
    • HID CMS Add-Ons
    • Biometric Capture
    • Data Protection
    • Secure Badging
  • Company
    • About Us
    • Security Code of Conduct
    • Differentiators
    • Contact
    • Support
  • Blog
  • Developer
  • Menu
  • Twitter
  • Facebook
  • LinkedIn
  • Youtube

Solve complex MFA challenges with advanced PIV Card technology

Our corporate PIV badging solution provides everything an enterprise needs to issue PIV compatible ID cards. Rapidly achieve compliance, strengthen security, and consolidate MFA solutions with a single badge capable of both cyber and physical access control.

Request A Test Drive

Maintain full control of your credentialing issuance process and related data while also providing the capability to issue credentials at scale while achieving NIST/FIPS security requirements. The corporate PIV  solution contains all of the products and services to enable you to stand up a PIV based credentialing platform capable of:

  • Implement PIV-I and PIV- C secure issuance models that produce MFA credentials that meet or exceed security requirements for FIPS
  • Provide basic identity proofing to ensure the credential is distributed to the proper user.
  • Provide a central management feature to allow administrators to produce, distribute, and manage the credential.
  • Utilize on-premise certificate authority for credential encoding
  • Utilize on-premise directory services for to locate the user
  • Issue MFA credentials to individuals that cannot immediately receive a PIV credential
  • Issue MFA credentials to visitors that only temporarily use site logical resources
  • Issue MFA credentials that are interoperable with different business partners and government entities

Cyber Access Control

Computer Logon

Email encryption

Digital signature

Message Protection

VPN Access

FIDO, PIV

Physical Access Control

Building Access

Visual inspection

Printers

Conference rooms

Server Rooms

Inventory Control

Cyber Access

Cyber Access

The smart card provides the strongest cryptographic security features and has been formally certified by NIST. Additionally, the smart card uses PIV standards to make it compatible with windows and the most popular certificate authorities.

FEATURES/CERTIFICATES

FIPS 140-2

FIPS 201

PIV/PIV-I/CIV

X.509 certificates via Microsoft, Comodo, IdenTrust

AES-128, DES and Triple DES, RSA 1024 and 2048, ECC

Common Criteria EAL 5+

Physical Access

Physical Access Features

The smart card can be ordered with different configurations to support existing physical access control readers.

COMPATIBLE WITH

SEOS

iClass

MIFARE Classic

MIFARE DESFire

Indala Prox

Converged ID = One ID Card…Many, Many Uses

Stop wasting valuable time and resources struggling to manage different MFA credentials. Instead, use the latest smart ID badge technology that is capable of both cyber and physical access control through one, single secure platform. These smart ID badges have also been certified by NIST so you can rest assured you can rapidly achieve compliance with even the most stringent regulations with your security investment.

Solution Components

The solution is comprised of the same technologies the world’s largest credential issuers use and is specifically calibrated to meet the highest security requirements while also seamlessly plugging into to the organizations data sources as well as being easy to use by the credential holder.

  • HID Credential Management System (CMS)
  • CyberArmed IdExchange
  • HID Crescendo 144K FIPS Smart Card
  • Yubikey FIPS 140-2
  • Thales Hardware Security Module

Installation process

Over the past 10 years, we have defined an installation methodology that enables the fast installation of your Enterprise MFA system. We will provide all the installation and training services to install and configure the system in accordance with operational needs. Upon completion, we will provide the necessary training and knowledge transfer activities to ensure the operations and security teams can operate the system. Our services will be separated into the following three phases:

  1. Architecture and design: Services include assisting with the planning, configuration and testing of software to determine the exact locations the system will be installed.
  2. System installation and configuration: Services include providing installation and configurations services to install the infrastructure and system components to realize a credential issuance capability.
  3. Training and knowledge transfer: Services include performing training to provide knowledge transfer for effective system operations.
Phase 1 – Architecture Review and System Configuration Planning

In this phase, we perform an architecture review of the infrastructure to help determine the best placement of the issuance systems. We will analyze the directory services and certificate authority to determine the configuration points.

Phase 1 Deliverables

  • Identity and issuance architecture specification
  • Issuance model design
Phase 2 – System installation and configuration

This phase will include the installation of the system components including; card management system, hardware security module and the credential issuance workstation. Next, we will perform the environment specific configurations to connect to the existing identity repositories.

Phase 2 Deliverables

  • Installed CA connector, CMS
  • Integrated data repositories
  • Card policy configuration
  • Fully issued credential
Phase 3 – Training and knowledge transfer

A critical aspect of issuance is the ability to effectively train the end user and system administrators. In this phase, we will work with credentialing staff to perform training in the areas of; requesting, credential issuance and credential maintenance. We will also provide system administration training to ensure the systems can be properly maintained for optimum performance.

Phase 3 Deliverables

  • Training modules and materials
  • In person training session

Usage

Once the Enterprise MFA solution has been installed, you can easily issue high assurance credentials through a simplified workflow. The video demonstration shows how the credential encoding process works.

Encoding a credential

This video demonstration shows the steps for encoding a credential. During the process, the credential will generate secure keys and interact with the certificate authority to obtain a certificate.

Our Solutions

  • Corporate PIV
  • Access Control
  • Identification Proofing
  • Mobile Credentials
  • Compliance Reporting
  • Credential Automation

Would you like to optimize your credentialing system?

Get In Touch!

Contact us for more information and product pricing. (202) 536-4943

Solutions

  • Corporate PIV
  • Access Control
  • Identification Proofing
  • Mobile Credentials
  • Compliance Reporting
  • Credential Automation

Products

  • IdExchange
  • Credential Management
  • HID CMS Add-Ons
  • Biometric Capture
  • Data Protection
  • Secure Badging

Company

  • About Us
  • Security Code of Conduct
  • Differentiators
  • Support

Subscribe for information on new products.



Copyright © Cyber Armed Security, LLC. All Rights Reserved.
Scroll to top
  • Products
    • IdExchange
    • Credential Management
    • HID CMS Add-Ons
    • Biometric Capture
    • Data Protection
    • Secure Badging
  • Company
    • About Us
    • Security Code of Conduct
    • Differentiators
    • Contact
    • Support
  • Blog
  • Developer

Pin It on Pinterest

  • 1
Share This
  • Facebook
  • Twitter
  • LinkedIn
  • Like