This software and hardware system monitors and controls access to information resources using two-factor authentication. It supports various methods including tokens, proximity cards, USB drives, and iButtons.
With hardware options such as tokens, proximity cards, USB drives, iButtons and more, this system offers support for multiple access control methods to fit your unique needs. Installation is quick and easy, and the overall usability of the interface is simple to learn, making it easy for all employees to utilize.
This system also includes a remote administration utility, allowing administrators to manage the system and access control from anywhere in the organization, offering greater convenience and efficiency. So if you're looking for a reliable and user-friendly system to monitor and safeguard your sensitive information resources, this one is definitely an option to consider.
Version 3.9: N/A