“For along time
‘single-sign-on’ (SSO) was considered to be a top heavy solution
that was difficult to implement and even harder to maintain.
Normally only opted for by very large enterprise networks. The
beauty of the ActiveCard option is its simplicity and ease of use!
Customers with as few as 25 staff to our larger corporate customers
are suddenly having a practical answer to password management
without the administration burdens. Small or large both are
experiencing the benefits immediately."
Creating secure password policies and associating them with users
and the network applications, can affect an organisation in several
- Increase the security of the network data and applications by
enforcing strict password requirements and policies without having
to place that burden on the shoulders of the users.
- Reduce help desk costs with regard to password
- Improve user productivity by streamlining their access to
network applications and by reducing the time wasted calling the
help desk with password-related issues.
- Deliver advanced security with smart card based
authentication. Strong authentication can be used to secure the
primary network logon and this then provides access to the
application credentials and other single sign-on data.
- Facilitate compliance with new government regulations for
identity, privacy, policy enforcement, and audit and
- Dramatically improved security
- Faster & easier system logins
- Reduced user frustration
- Powerful centralised user administration
- Demonstrable return on investment
- Pathway to legislative compliance
SecureLogin assists enterprises overcome the challenges of
complying with e-business legislation, such as the Sarbanes Oxley,
HIPAA and the Gramm-Leach-Bliley Acts, by enforcing corporate
security policy and restricting users’ access to network data
- Smart card integration
SecureLogin is the perfect combination with smart card based
network authentication. Strong authentication can be utilized to
secure the primary network logon and this provides access then to
the application credentials and other SSO data. Furthermore, this
capability can be leveraged to achieve the convergence of physical
and logical security.