Posts Tagged ‘activclient’

Understanding compliance for NIST SP800-171

Wednesday, August 2nd, 2017

In today’s world of technology, the need for strong security measures to protect sensitive government data from hackers has never been a higher priority. To address this issue, the Department of Commerce National Institute of Standards and Technology has released NIST Special Publication 800-171, Protecting Controlled Unclassified Information in Non-Federal Information Systems and Organizations. Any contractor to governmental agencies is directly impacted by SP800-171 with the implementation deadline of December 31, 2017.

Implementing the correct security and data protection processes, and deploying security technologies such as Authentication, Privileged Access Management and others has become increasingly complex. We can help manage the complexity of this mandate for you so you can continue to do business with the Government. Our ability to provide a comprehensive solution across different populations within the enterprise ensures organizations realize significant operational cost savings, a simplified user experience for both employees and customers, as well as greatly improved security and compliance.

NIST SP800-171 requirements demand rigorous access control. Non-compliance presents serious consequences for contractors, including legal action by the government and termination as a contractor. One of the most popular solutions includes HID ActivID ActivClient but this is just one piece of the puzzle.

You can request a complete eBook available upon request that focuses on some of the most complicated parts of the mandate – and how multi-factor authentication (MFA) and Privileged Access Management (PAM) offer a comprehensive but cost-effective path to complying with these aspects of NIST SP800-171. Please contact us today for a complete copy of this documentation, attend an informative webinar reviewing these requirements or a request a brief consultation from our experienced team of security experts to be sure you stay compliant.

HID ActivID® ActivClient 7.1 Update for Windows 10

Wednesday, May 24th, 2017

AdvantIDge is proud to offer a complete solution for multi factor authentication that meets NIST 800 171 standards. The ActivID solution includes software, support and Genuine HID Credentials including Prox, iCLASS SE and SEOS for secure access to computers, phones, tablets and other devices with sensitive company data. The newest version of ActivClient is designed to offer the highest level of security and compliance with the latest Microsoft products, and adds support for the new Microsoft Edge browser on the Windows 10 platform.

ActivID ActivClient 7.1 for Windows, is the industry standard from HID Global with the latest in market-leading advanced security client that protects workstations and networks with smart cards and USB tokens using two factor authentication, or 2FA. ActivID ActivClient is the leading smart card middleware used with Common Access Card (CAC), Personal Identity Verification (PIV) and Personal Identity Verification – Interoperable (PIV-I) smart cards in the US Federal Government.

The ActivID ActivClient 7.1 improvements include:

  • Microsoft Edge and improved Windows 10 support. With this release, ActivClient extends its support for the Windows 10 and Windows Server 2016 platforms to provide increased coverage of smart card usage scenarios. For example, customers can now use the latest Microsoft Edge browser for SSL and TLS-based smart card authentication to web sites. Windows Universal Apps can now also leverage ActivClient for smart card authentication.
  • Microsoft Office 2013 and 2016 support. Enterprise customers can now leverage ActivClient for smart card-based authentication, signature and encryption with the latest Microsoft Office versions. ActivClient automatically configures the Outlook® security profile based on smart card certificates, reducing the configuration effort for smart card users.
  • Bundled Software Development Kit. ActivID ActivClient includes samples and documentation for the standard-based APIs it supports: Microsoft Mini Driver / CNG, PKCS#11, PIV and BSI. These APIs provide access to Public Key cryptography (PKI), One-Time Password and data storage services on smart cards. C and Java interfaces are available

ActivID ActivClient 7.1 is available at no charge to ActivID ActivClient customers with a current maintenance contract. It can be electronically downloaded from HID Global’s Identity Assurance Support Portal.

Current ActivID ActivClient customers:
AdvantIDge recommends customers using ActivID ActivClient 6.2 or 7.0.x to upgrade to version 7.1. Version 6.2 and 7.0.x are no longer available to new customers but will be supported until July 2018.

The ActivID ActivClient SDK is now bundled in ActivID ActivClient; as a result, the part numbers for the stand alone ActivClient SDK (DKCXXXWL, DKCXXXWLM4 and DKCXXXWLM5) as a separate product have been discontinued (DKCXXXWL, DKCXXXWLM4 and DKCXXXWLM5). ActivClient SDK customers can now access the same functionality at no charge as part of the ActivClient license.

NOTE: The new NIST SP800-171 requirements demand rigorous access control. Non-compliance presents serious consequences for contractors, including legal action by the government and termination as a contractor. The HID ActivID ActivClient is a proven piece of the puzzle for compliance. You can request a complete eBook available upon request that focuses on some of the most complicated parts of the mandate – and how multi-factor authentication (MFA) and Privileged Access Management (PAM) offer a comprehensive but cost-effective path to complying with these aspects of NIST SP800-171. Please contact us today for a complete copy of this documentation, attend an informative webinar reviewing these requirements or a request a brief consultation from our experienced team of security experts to be sure you stay compliant.

AdvantIDge offers a wide variety of security solutions that use encrypted RFID cards with HID iClass SEOS for access control, computer logon, time and attendance in addition to card printer systems, or other visitor management devices, to fill any of your asset tracking, visitor management, or identification card needs. From card printers and supplies for issuance, through to badge clips and other peripherals to put them into your users hands. With more than 40 years of combined industry experience, we’re ready to help you achieve your identification goals. For specific information please contact our security experts at 800-965-5932 for more information on secure solutions after reading the following brochure on ActivID-ActivClient.

Multi-Factor Authentication Requirement NIST SP 800-171

Tuesday, January 3rd, 2017

NIST SP 800-171Hackers are getting smarter every day. Cyber threats and security breaches have progressed to the point where passwords are no longer considered sufficient to protect data on any device on any network. This makes your organization vulnerable to today’s sophisticated phishing attempts and other targeted attacks. That is why the federal government now requires all contractors to comply with NIST SP 800-171 guidelines for multi-factor authentication — or risk losing their contracts! If your organization works with the federal government, setting up two factor authentication is absolutely critical to ensure your business is in compliance. Below is a list of the key requirements of this new security regulation. Read through it carefully, identify your needs, and contact us for an immediate consultation or attend an informative webinar based on your level of urgency. Don’t wait until it’s too late!

Key requirements in NIST SP 800-171 include:

Access Control

  • Limit information system access to authorized users
  • Separate the duties of individuals to reduce the risk of malevolent collusion
  • Limit unsuccessful login attempts
  • Require encryption and authentication of various devices (including mobile devices), and route remote access through managed access control points

Awareness and Training

  • Educate managers, systems administrators and users about security risks associated with their activities and applicable policies, standards and procedures
  • Provide security awareness training on recognizing and reporting potential indicators of insider threat

Audit and Accountability

  • Use automated mechanisms to integrate and correlate audit and reporting processes
  • Support on-demand analysis and reporting

Configuration Management

  • Limit the types of programs users can install
  • Control and monitor all user-installed software

Identification and Authentication

  • Enforce minimum password complexity, i.e., “smart passwords”
  • Disable identifiers after a defined period of inactivity
  • Prevent reuse of identifiers for a defined period

Incident Response

  • Develop and test an incident response plan.

Maintenance

  • Ensure equipment removed off-site is sanitized of any UCTI
  • Require multifactor authentication to establish nonlocal maintenance sessions

Media Protection

  • Protect (i.e. physically control and securely store) information system media (paper and digital) containing UCTI*
  • Sanitize or destroy information system media containing UCTI* before disposal or release for reuse

Personnel Security

  • Screen individuals prior to authorizing access to systems containing UCTI*
  • Maintain audit logs of physical access
  • Control and manage physical access devices

Risk Assessment

  • Scan for and remediate vulnerabilities in the information system and applications

Security Assessment

  • Periodically assess and monitor the security controls for effectiveness in their applications
  • Develop and implement plans of action designed to correct deficiencies and reduce/eliminate vulnerabilities

System and Communications Protection

  • Separate user functionality from information system management functionality
  • Implement cryptographic mechanisms to prevent unauthorized disclosure of UCTI* during transmission
  • Control and monitor the use of Voice over Internet Protocol technologies

System and Information Integrity

  • Update malicious code protection mechanisms when new releases are available
  • Identify unauthorized use of the information system

*UCTI – Unclassified Controlled Technical Information

You can request a complete eBook available upon request that focuses on some of the most complicated parts of the mandate – and how multi-factor authentication (MFA) and Privileged Access Management (PAM) offer a comprehensive but cost-effective path to complying with these aspects of NIST SP800-171. Please contact us today for a complete copy of this documentation, attend an informative webinar reviewing these requirements or a request a brief consultation from our experienced team of security experts to be sure you stay compliant.

With over 40 years of combined industry experience, AdvantIDge has been helping institutions around the world create secure, cost-effective identity management solutions featuring easy-to-use secure access control systems. As one of the top value added resellers for HID Global, the industry’s most respected security manufacturer, AdvantIDge is committed to ensuring that every client receives the right ID products for their specific needs. Contact us today to set up a private consultation or attend a webinar to learn about your options to comply with NIST SP 800-171 and receive a new level of service in your experience with a security provider!