WHY DO YOU NEED A NEW IAM SOLUTION?

Gadgets Icon

Users switch to mobile-based activity

Laptops Icon

Many-to-one has become the new norm for multiple businesses

Phishing Attacks Icon

Phishing and other cyber attacks are on the rise

Security Policy for Employees Icon

Employees oppose security policies and try to cut corners

What is Hideez Enterprise Solution?

Hideez Enterprise is a universal identity and access management solution that consists of wireless hardware tokens - Hideez Security Keys, Hideez USB Bluetooth Dongles, Hideez Enterprise Server, and Hideez Client application.



Out-of-the-box Compliance


lazyload
lazyload
lazyload
lazyload

What are the components
of the Hideez solution?

1. Hideez Security Keys

Multifunctional hardware security keys storing the credentials recorded by the enterprise admin or added by the employees themselves. You can choose between Hideez Key 3 and Hideez Key 4, depending on the type of connection you need.

2. Hideez Enterprise Server

Hideez Enterprise Server manages the Keys, centralizes associated endpoints, and stores digital identity information — roles, permissions and other settings.

3. Hideez Client app

An application which confirms authorization and connection with individual devices, enables hotkeys for entering credentials and one-time passwords.

4. Hideez Bluetooth Dongles

Hideez USB Bluetooth dongle connects your PC to the Hideez Key or any other Bluetooth devices, and gets the connection to be stable.

Main Features

Hideez Enterprise Server

Hideez Client

Hideez Key Icon

A wizard for adding employees, devices, and workstations

People Icon

Personal and shared accounts

Many Laptops Icon

Workstation management and control

Folder Icon

Dashboard with main data

Audit Icon

Reports and audit

Hideez Client

Authentication Icon

Device authorization via PIN, button or Master Key

Hideez Key Icon

Smart lock - a computer is locked automatically by proximity

Bluetooth Icon

Unlock a computer by proximity, and by BLE or RFID tap

Hotkeys Icon

Hotkeys for entering credentials in seconds

Hideez Security Key (+ Bluetooth Dongle)

Hideez Key Icon

Locally stores employee credentials

Cybersecurity Icon

Encryption according to the AES-128, RSA-1024 and ECC standards

Two-Factor Authentication

2FA for a computer unlock - PIN, button or Master Key

RFID Tag Icon

Opens doors with RFID tag. Supports Em-Marine and HID standards (Mifare on request)

One-time passwords Icon

OTP generation

Order a Pilot

Option 1

Number of keys
2 (to be returned)
Pilot Duration
1 month
Hideez Enterprise Server License
1st month
(with updates and support)
Support
One call per week - 1h Email support
Price
FREE
Order

Option 2

Number of keys
Pilot Duration
1 month
Hideez Enterprise Server License
1st month
(with updates and support)
afterwards: no license duration limits, no support and updates, number of seats is locked.
Support
One call per week - 1h Email support
Price
250$
Order

Option 1

Option 2

Number of keys
2 (to be returned)
Pilot Duration
1 month
1 month
Hideez Enterprise Server License
1st month
(with updates and support)
1st month
(with updates and support)
afterwards: no license duration limits, no support and updates, number of seats is locked.
Support
One call per week - 1h Email support
One call per week - 1h Email support
Price
FREE
250$
Order Order
Choose quantity:
Choose quantity:

What are the Benefits?

Invisible credentials Icon

Invisible Credentials

No need to disclose credentials to employees. Credentials are transferred via Bluetooth from a proximity-based hardware token

Password Control Icon

Password Control

Manage hundreds of passwords on behalf of your employees, and deprovision ex-employees automatically

Prevent Phishing Icon

Phishing Prevention

Get 100% protection against phishing attacks without additional employee trainings

All-in-one Solution Icon

All-in-one Solution

Key for physical entry, second-factor authentication and one-time-password manager.

Minimized Human Factor Icon

Minimized Human Factor

Eliminated risks of disclosed credentials, unauthorised access and phishing attacks without active involvement of employees

Business Continuity Icon

Business Continuity

Stronger protection against anticipated cybersecurity threats prevents interruptions of company activity.