Axiad IDS, Inc.

Resources

Resources

One point of contact tailored to your population’s needs

Axiad ID Cloud Solution Brochure

Axiad ID Cloud is a modular and flexible trusted identity solution delivered as a cloud service. By providing organizations with versatile Multi-Factor Authentication (MFA), Axiad ID Cloud enables quick compliance with even the most rigorous mandates and offers the highest levels of security protection against unauthorized access or IT breaches. Axiad ID Cloud is automated, which eliminates manual setup - increasing scalability and reducing the risk of human error. Axiad ID Cloud is a fully hosted cloud-based platform that provides organizations with fast and simple deployment, less complexity and lower upfront investment.


Axiad ID Cloud Data Sheet

Axiad ID Cloud Data Sheet

Comprehensive and fully automated, the cloud platform eliminates manual setup and processes prone to human error. Axiad ID Cloud improves the user experience by taking Trusted Identity credentials beyond authentication devices to include cell phones, laptops and other mobile devices. It helps leverage the power of the digital world to operate confidently within it. The Axiad ID Cloud platform enables a portfolio of products that help organizations quickly and cost-effectively implement and manage a mix of user and device credentials, as well as covers a range of assurance and authentication levels meeting each organization’s unique and budgetary requirements.


Trusted Identities Through the Cloud

Trusted Identities through the Cloud

  • Trusted user PKI Identity service, providing PKI/smart card and mobile device based on high assurance digital identities.

  • Administration Capabilities such as Certificate and smart card lifecycle management (Issuance, Revocation, Suspend/Resume, Key Escrow/Recovery)

  • Help desk and Self Service Portal

  • Mobile device enablement

  • Auditing and Reporting capabilities

  • Options such as HSM, Smart Card printing

  • Virtual Private Cloud – A Secure Extension of Your Corporate Network


Axiad ID Cloud

Axiad ID Cloud Summary

Trusted User: Certificate-Based Identity
Trusted User: Flexible Authentication
Trusted Infrastructure: Identity for IT Systems.


Delivering Trusted Identity Solutions

Axiad IDS holistic and comprehensive approach

Organizations require strong identities they can trust to conduct business, while customers, employees, and citizens need a less frustrating method to authenticate their identity. Our mission is to enable our customers to issue, manage, and use Trusted Identities for people, systems, and devices to prevent unauthorized access and IT breaches, enabling trust for today’s digital world. Trusted identities require a holistic approach; from initial issuance of the credential to securely managing that credential over time.


Axiad ID Cloud works with the YubiKey

Unleash the power of the YubiKey through Axiad ID Cloud

Easily deploy the YubiKey and utilize its breadth for a stronger, more flexible authentication solution. Delivering the YubiKey through Axiad ID Cloud allows enterprises to maximize their investment and benefit from the full power of this popular security key. Axiad ID Cloud enables the YubiKey to expand from user authentication device into a secure PKI device providing data and transactional security.


YubiKey Axiad IDS configuration quide

Axiad ID Cloud and YubiKey Configuration Guide

Axiad ID Cloud is a cloud-based Identity and Access Management service that provides the ability to provision, manage and use digital credentials to add strong authentication capabilities to an infrastructure. It includes support for both PKI and OTP authentication. This document provides an overview of the steps you must take to initialize your YubiKey 4 token.


SAFE-BioPharma Compliant Identity Credentials with Axiad ID Cloud

SAFE-BioPharma Solution Brochure

The cybersecurity needs of the biopharmaceutical and healthcare industries are unique and complex. That’s why organizations are turning to Axiad ID Cloud, a cloud-based solution, that enables users to easily deploy, use, and manage smart cards and tokens with PKI certificates for authentication, signature, and encryption - any time, anywhere.


SAFE-BioPharma White Paper

White Paper - The Secure Credential Solution for Biopharmaceutical and Healthcare Communities

Highlights:

  • The security risks related to identity and access management in the connected pharmaceutical/healthcare sector

  • The unique capabilities of Axiad ID Cloud to provide organizations with digital signing, user identity, device identity, and data confidentiality using PKI- based certificates from Federal Bridge/SAFE-BioPharma Certified Certificate Authority and Enterprise PKI CA


Axiad IDS Healthcare Solutions Brochure

Authentication, digital signature, identity proofing, information integrity

SAFE-BioPharma - Assuring Trust in the Healthcare Ecosystem.


SAFE-BioPharma Press Release

SAFE-BioPharma issued press release: Axiad ID Cloud Now Certified Compliant With Safe-BioPharma Digital Identity and Signature Standard

SAFE-BioPharma Association, LCC today announced Axiad ID Cloud, a cloud-based trusted identity platform from its newest vendor partner, Axiad IDS, has been certified compliant with SAFE-BioPharma global identity and signature standard.


Axiad IDS Featured in Healthcare Tech Outlook Magazine

SAFE-BioPharma Introduction and Overview

SAFE is the only global standard for the healthcare community that enables trusted, secure, legally enforceable paperless business and clinical transactions. 


Protecting Controlled Unclacified Information

Protecting Controlled Unclassified Information

NIST SP800-171 is a complicated directive. This backgrounder document will break it down for you by outlining the timeline, describing the Executive Order and help you make sense of the DoD DFAR Clause and NARA released FAR clause. We will help you understand who this mandate affects and go into detail on the Security Families outlined in the publication


NIST Special Publication

NIST special publication: the complete source document by NIST

Did you know the Special Publication document produced by National Institute of Standards and Technology NIST is nearly 80 pages long? The document covers the NIST framework for Improving Critical Infrastructure, details on each of the 14 security requirements, mapping tables and a special section dedicated to acronyms.


TechTarget

NASA CIO refused to review a contract until compliance was met

NASA CIO Renee Wynn refused to sign a contract with Hewlett Packard (HPE) due to security issues at HPE. If she renewed the contract, the security risks would remain, and HPE would not be forced to make them a priority. That was not acceptable to Wynn. She needed to send HPE a message, and she likely considered NIST SP 800-53, and more recently NIST SP800-171  mandates that require government contractors meet specific security requirements. HPE took the steps to address the security issues.


Secure World Publication

Featured in November SecureWorld publication

In December of 2017, the National Institute of Standards and Technology (NIST) Special Publications (SP) 800-171 will come into effect. What challenges will companies face in establishing compliance with NIST SP800-171 for their own companies? Bassam Al-Khalidi shares his thoughts on this major security mandate and potential roadblocks coming ahead.


How to quickly, easily, and cost-effectively comply with NIST SP800-171

Speaking presentation on NIST SP800-171 at Data Connectors Security Conference

Presented at August 10, 2017 Data Connector Event: Counting Down: How to Quickly, Easily and Cost-Effectively Comply with NIST SP 800-171. Presented by Gurpreet Manes, VP, Technology . Take a peek at what was presented to a group of contractors affected by SP800-171.


800-171 e-Book

E-book: Safeguard unclassified information by December or risk your government contracts

NIST SP800-171 requirements demand rigorous access control. Non-compliance presents serious consequences for contractors, including legal action by the government and termination as a contractor. This eBook focuses on some of the most complicated parts of the mandate – and how multi-factor authentication (MFA) and Privileged Access Management (PAM) offer a comprehensive but cost-effective path to complying with these aspects of NIST SP800-171.

CIO Applications

Featured in April 2017 issue of CIO Applications

Founded by a team of experts with extensive experience and strong industry knowledge, Axiad IDS has garnered recognition as an important player in the Identity assurance domain by leveraging its experience to address numerous challenges within the compliance space. In this article, learn how Axiad is helping organizations across industries quickly, simply and affordably address potential breaches head-on before they happen.


Cyber Top Gun Summit

Axiad ID Cloud launched at Cyber Top Gun Summit

Axiad IDS, a leading provider of trusted identities for enterprise, healthcare, government, and financial organizations, announced the general availability of Axiad ID Cloud, a modular enterprise identity cloud service. Axiad ID Cloud enables organization to issue, manage, and use identities they can trust. It helps organizations protect against costly data breaches and comply with rigorous new mandates.