2-Factor-Authentication by IDpendant - Security from a single source
The market leader IDpendant GmbH is specialized on the integration of authentication systems.
IDpendant designs solutions for the 2-Factor-Authentication (2-FA) specifically for the customers’ needs and requirements. Whether classic certificate-based systems with smart card or the use of RFID cards and biometry are requested for the PC logon - IDpendant has the solution.
The foundation of strong authentications are professional PKI-solutions. Only under the provision of secure and efficient Certificate Authorities (CAs), a reliable identity check and -assurance can occur. IDpendant plans PKI-Systems in multiple forms, from integrated worldwide corporate PKI up to small CA for limited user groups.
State of the art Hard Disc Encryption
Additionally, IDpendant secures mobile devices with efficiently manageable encryption methods. Especially in the field of data encryptions, administration and security are seen as one. Only by these means, a practical and secure application is justifiable.
First class Partner
In order to provide optimal interoperability and long-term investment security, IDpendant cooperates with first-class and worldwide recognized manufacturers. The portfolio of authentication technologies, security hardware such as smart cards and HSMs, Single-Sign-On systems, encryption solutions and Card-Management systems is being completed by Client-Security products.
From Munich to the world
IDpendant has its headquarter in Unterschleissheim near Munich and coordinates all national and international business from there. The customer base includes German, as well as international companies and public sector clients. The partner companies of IDpendant are also spread out over several continents.
IDpendant GmbH offers you products from these product groups:
- Public key infrastructures (41)
- Authentication (115)
- Banking (IT security solutions) (89)
- Biometrics (16)
- Smart cards (systems and applications) (17)
- CIP - Critical Infrastructure Protection (security solutions) (96)
- Electronic signatures (34)
- Email security solutions (100)
- Endpoint Security (107)
- Health services (IT security solutions) (70)
- Identity and access management (135)
- Cryptography (68)
- Mobile security services (157)
- RFID (16)
- Single sign-on (47)
- Trust center (products and services) (15)
- Consulting IT security (155)
- Access protection (68)