The versatile middleware for the protection of your IT infrastructure

The world of IT security consists of three parts: one is the security system itself and the second part are the corresponding physical access devices (USB tokens, smart cards, etc.) containing passwords and user credentials saved on these devices. The third part is the middleware which facilitates the secure interaction between these applications and access devices. Flexibility and independence are paramount aspects of every middleware.

No matter which ones of your applications have been equipped with a security system: depending on the selected standard, you can nearly always count middleware in. The most popular applications are Single Sign On, hard disc encryption, Secure Remote Access, Secure e-mail, digital signature, etc. Thanks to the so-called two-factor authentication - requiring both the card or USB token you have and the PIN you know - your company will always be on the safe side. Three-factor authentication including biometrical data is also available as default.

Your benefits at a glance:

  • Middleware supports all major operating systems, e.g. Microsoft Windows 7, Vista, Mac OS X, Linux, etc.
  • Authentication with up to three factors (card/USB token, PIN, biometrical data) is possible.
  • Middleware can be used with countless IT security applications: Single Sign On, hard drive encryption, Secure Remote Access, etc.
  • The vast majority of standard interfaces are supported
  • Middleware is readily deployable and user-friendly
  • The use of middleware provides a quick return on investment

IDpendant offers Middleware by the following manufacturers:

  • A.E.T. Europe
  • Aladdin
  • Athena-SCS
  • Atos
  • Gemalto
Search IDpendant