Digital Persona Pro

Search In:

Security Software

Quick Details:

Version: 2012

License: Trial Version

Date Added: January 12, 2012

Digital Persona Pro

Edit By Downloadstack

Review Details:

AVG Internet Security 2014


Quick Review:


Secure your business with biometrics, proximity cards and more

DigitalPersona Pro Enterprise is a multi-factor authentication and access management solution that's managed via Active Directory. It secures access enterprise systems and applications from notebooks, desktops, and "kiosk-style" shared workstations from a single console. This software solution takes advantage of your Active Directory infrastructure to deliver high scalability and fault tolerance without special server hardware. In addition, IT managers can use familiar Group Policy tools to quickly create, deploy, enforce and monitor security policies across their domain.

Strong authentication. Replace passwords with fingerprints, cards, and more.
Single Sign-On (SSO) made seamless. Add to existing enterprise apps – without hassles.
Access control for cloud apps. Prevent users from accessing business data from uncontrolled devices.
Emergency access recovery. Avoid lockouts when credentials are lost, stolen or forgotten.

Protect access to computers, applications and networks from one console


DigitalPersona Pro Enterprise gives you a cost-effective way to control access to your computers, applications, and networks. It lets you add strong authentication on top of Windows and your existing password-based applications as needed, without changing the apps themselves. With DigitalPersona Pro Enterprise, you can address today’s pressing needs and seamlessly scale up to handle more users and more applications as your requirements grow.




Multi-Factor Authentication

Multi-credential authentication – mix and match authentication credentials: Windows Password, PIN, Fingerprint, Contactless Cards (HID iCLASS memory cards; HID Crescendo C700 PKI cards; MIFARE Classic 1k, 4k and mini memory cards), Smart Cards (PKCS11 and CSP-compatible), Proximity Cards (HID 125 kHz) and Bluetooth Phones.

Multi-factor enforcement – require combinations of credentials to address growing compliance mandates.

Roaming – store user credentials centrally for automatic use on multiple computers.

Attended enrollment – require a supervisor’s permission when users enroll or change credentials.


Windows  Logon

PC logon control – enforce multi-factor authentication policies for PC logon.

Domain password randomization – enforce use of strong authentication by preventing users from knowing their password.

Thin clients – use a variety of credentials in Citrix XenApp, Microsoft Terminal Services and VMware View environments.


Application SSO

Fast, IT-configured application logon control – enforce advanced authentication policies for logging into applications on the Web or cloud, on Citrix servers, in terminal emulators and on Windows.

Optional secondary authentication – require users to prove that they are the person at the computer when launching enterprise applications.

No changes to apps – provide single sign-on and enforce strong authentication without modifying underlying applications.

Application password randomization – prevent users from being able to log into applications (esp. remote Cloud/Web or Citrix apps) from uncontrolled devices by automatically generating passwords during Change Password operations.


Fast Kiosk  Access

Shared-user workstation (“kiosk”) logon control – enforce advanced authentication policies for shared workstations (such as walk-up kiosks) where people use their individual credentials to unlock Windows and log into applications.

Fast user switching – switch among users quickly when accessing applications from shared Windows accounts.


“Token-less” VPN Logon

Network logon control – secure access to VPNs, Microsoft Outlook Web Access (OWA) and other RADIUS-compatible applications with OATH-based one-time passwords (OTPs).

Token-less operation – link use of one-time passwords to other authentication credentials (e.g., use fingerprint and Bluetooth phone) to avoid the need to carry or type in OTP codes.

Tokens – use traditional one-time password tokens (key fobs and soft tokens on smartphones) for access from other devices.


Access Recovery

IT-assisted recovery – avoid lockouts due to forgotten passwords; no network or Internet connection required.

Self-service recovery – give users the ability to get into their PC by answering questions (which can be customized by IT to avoid use of personal information); no network or Internet connection required.


Alternative's in Privacy Software you might be interested in
More Downloads in Security Software you might be interested in
AVG Internet Security 2014