Skip Navigation

Certificate-based, multi-factor authentication is a mainstay security technique used by the U.S. Federal Government to secure access to agency networks, protect the identities of users, and ensure that a user is who they claim to be.

Evolving needs around cloud applications and mobile devices, combined with rising threats, and the need to reduce costs, require entirely new considerations for access control.

View this on-demand recording to hear from Thales TCT, and their partner Intercede, where you will have the opportunity to learn how to strengthen your authentication and address topics such as:

  • Gaining better self-control of data
  • Improving management and visibility
  • Addressing access security methods of any user and any risk level
  • Deploying future-ready solutions to address evolving business needs

Download Now

Offering the broadest range of multi-factor authentication methods and form factors, Thales TCT facilitates and empowers enterprise-wide security initiatives for maintaining and improving secure access to enterprise resources.

Download Now

There are several challenges impeding adoption across federal agencies of PIV for privileged user access. Primarily, the time and cost required to migrate to PIV-enabled technologies for privileged user accounts can be unmanageable in the intermediate term. Pursuing technologies that support PIV-enablement of privileged user accounts is an evolutionary process and requires significant investment as systems are updated, replaced, or migrated. In many cases, this isn’t practical for legacy systems. Download this White Paper to learn why authenticators are proven and practical alternative to PIV.

Download Now

Attendees of this webcast learned about next generation authentication methods that provide secure access to networks and applications from a variety of devices while ensuring compliance. We also discussed:

  • FISMA Compliance & Electronic Authentication Guidelines
  • HSPD-12 Compliance & PIV Derived Credentials for Remote Identity Populations

Download Now

Middleware Enabling Certificate-based Solutions for Remote Access and Advanced Security Applications

Download Now

The sKey3250, a certificate-based USB authenticator, provides multi-factor access to sensitive networks and workstations through a single device

sKey3250 Product Brief

Smart Card 650 (SC650), a certificate-based smart card, enables strong two-factor authentication and proof-positive user identification in all PKI environments.

Download Now

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.