In the 1950s if a criminal wanted to steal data or goods from your business they would break in, rummage around and make off with their swag.

How things have changed!

Now the ‘cyber criminal’ can be based anywhere in the world. Information is seen as the most valuable asset of a business and, this makes it liable to being targeted.

Technology is at the heart of most businesses, with IT being an integral to our key industries such as manufacturing, retail, transport, health and education. 

Whether it’s to power a till system in a shop, or computer system in an office, we rely on IT in every aspect of day-to-day life.

Every time technology advances it brings added benefits, but it also gives opportunist cyber criminals the chance to explore vulnerabilities in software and online applications.

Even huge multinationals like Linked, Yahoo or Microsoft are vulnerable to cyber attacks and all have had breaches in the last few years.

In the case of Yahoo an attack led to data for over 3 billion accounts being stolen. The huge reputational damage this does and the stress it can cause customers in huge.

In fact, it could be the death of a business!

We now see cybercrime in the form of phishing and spear phishing attacks, data breaches and malware on a daily basis across the globe. 

What have you done to protect your organisation?


What is HID® DigitalPersona®?


So, what can you do to help protect your organisation from these attacks? The answer is HID DigitalPersona

For years businesses have relied on traditional authentication methods for accessing their IT systems – such as usernames and passwords.  Sadly these are no longer effective, with over 35 million record breaches reported in September alone. 

HID DigitalPersona transforms the way we access computer systems, introducing multiple authentication methods and better protecting systems from unauthorised access. 

HID DigitalPersona deploys Multi-Factor Authentication (MFA) so that if your password has been compromised (the only factor needed to gain access to your network) then a second or third factor is needed.

These factors can include a physical item like a smart card, biometrics such as a fingerprint, a location / IP address and other factors. All these add an extra layer of security before access in granted.

It allows organisations the broadest range of authentication methods for Windows® logon as well as VPN, web, mobile and cloud application access.

The benefits of DigitalPersona


We now know what DigitalPersona is. Let’s explore some of the key benefits of HID DigitalPersona in more detail. 

Rapid set-up within existing infrastructures


DigitalPersona offers one of the fastest set-up multifactor authentication solutions on the market today. Typically the system can be deployed within days – compared with other solutions that can take weeks or even months. 

DigitalPersona also provides native support for Active Directory®, Azure® AD and Microsoft 365®, enabling you to leverage your existing Microsoft® expertise. Administration is simplified: no proprietary tools are needed to learn, manage or administer the system.

It’s the ultimate authentication solution – providing complete coverage


In addition to the traditional set of authentication factors (something you have, something you know and something you are), leveraged by competing solutions, DigitalPersona as allows for contextual risk factors. 

These include time, velocity and location covering what you do, where you are and when you act. This allows you to precisely match your risk exposure to the optimal security posture for your organisation.

Versatile authentication


DigitalPersona’s wide range of authentication factors allow organisations to implement strong authentication best practices without the fear of compromise due to lack of user compliance. The range of authentication factors offer ultimate freedom of choice empowering organisations to balance security and convenience.

The range of authentication factors comprise of: 

Something you KNOW: Windows Password, PIN as user knowledge authenticators
Something you ARE: Fingerprint, Face Recognition biometrics as user inherent authenticators
Something you HAVE: One Time Password (OTP) tokens; Smart credentials (Smart Cards, Security Keys USB-A and USB-C) with support for FIDO2, PKI, OATH; PACS credentials (Contactless Cards, Contactless Writeable Cards, Mobile ID); Bluetooth and NFC Devices as user possession authenticators
Something you DO: Keystroke Biometric
WHERE you are: IP address, Integrated Windows Authentication (IWA)
WHEN you act: Time frame

Discover more… 


Are you ready to better protect your IT systems from unauthorised access? Do you want to find out more about DigitalPersona?