icon

Hideez Blog | Identity Management News, Best practices & Tips

Point of Sale Authorization: How to Avoid POS Security Issues?

Point of Sale Authorization
Nowadays, every reputable retailer, no matter their size, should use a POS system. Point of sale authorization makes every business more streamlined, is cost-effective, and brings a ton of additional benefits. That said, POS authorization also brings up potential security issues.

How Does Tap And Go Technology Work? Hideez Tap and Go Devices

tap and go technology
When talking about this technology, the simple tap and go meaning refers to contactless payments. Instead of the traditional way of paying for things by swiping your card or putting it into a chip reader, tap and go technology enables contactless communication between your device, and the device you want to make your payment to.

SAML Basics: What is SAML And How Does It Work?

<b>SAML Basics: What is SAML And How Does It Work?</b>
SAML authentication is a widely used method that makes all of our lives easier. But, most online users don’t know how SAML works or what it even is, for that matter. There are many terms you can use to describe the features and capabilities of SAML for authentication purposes. On this page, we’ll run you through all of the SAML basics and help you understand this open standard the majority of people use daily.

What is a Hardware Token? Hard Tokens vs. Soft Tokens

Hardware tokens Explained by Hideez
Passwords are flawed, and nowadays, obsolete methods of authentication. For this reason, cybersecurity companies have developed more sophisticated authentication methods for ensuring enhanced user security. The most notable examples are hardware tokens, dedicated portable devices that authenticate the user’s identity and prevent unauthorized access.

What is Identity Management? Enterprise Identity Management Solutions

What is Identity Management? Enterprise Identity Management Solutions
Cybersecurity has come a long way in the past two decades. So much so that proper identity management practices have become a basis for strong cybersecurity systems. In short, you always have to make sure that everyone is who they claim to be when requesting access. Equally as important, you should be certain that they are allowed to access what they’re requesting.

How to Use Hideez Key's RFID Module

How to Use Hideez Key's RFID Module
Hideez Key can serve as an electronic key for home, office or gym. Using the RFID features does not require any additional software. Hideez Key is equipped with RFID module that works on the 125 kHz frequency bandwidth. The RFID antenna with the control unit can be found under the top cover.