身份信息与访问管理解决方案


​​​​​​金雅拓身份信息与访问管理(IAM)解决方案可以帮助企业满足围绕云应用和移动设备的不断增长的需求,提供在线资源的安全访问,利用市场领先的强认证和数字化签名产品来保护员工、合作伙伴和客户的数据互动。

金雅拓提供完全自动化的云认证和全面的周期管理,其认证管理平台的设计旨在简化复杂环境下的部署、减少日常成本并提供稳固的基础从而根据云端和本地(on-premises)PKI环境进行扩展。

无论是在云、企业数据中心还是虚拟环境,金雅拓都能提供广泛的认证方案和规格,确保企业可以安全访问任何设备上的应用。 

我们的解决方案

金雅拓的身份信息和访问管理产品使用强大的认证系统, 保证企业与可信赖中心之间进行安全访问、身份识别和互动。我们的解决方案包括云和基于服务器的管理平台,先进的开发工具,以及各类认证器。​

  • Authentication-as-a-service

     认证即服务 

    Safenet认证服务(SAS)提供来自云的自动强大认证,可支援不同的令牌,帮助企业保护任何设备上在云和本地的(on-premises)应用。​

    Safenet认证服务-云的强大认证服务​

  • ​认证管理平台

    ​认证管理平台

    金雅拓的企业级认证管理平台能够实现安全访问、联网访问、PKI数字签名以及全面的认证周期管理​.

    SafeNet身份认证管理器(SAM) – OTP与PKI认证服务器
    IDA​dmin 200 – 部署便捷的智能卡管理系统​

  • OTP认证器

    OTP认证器

    提供动态的一次性口令(OTPs),无论关键应用程序位于何处或来自何种设备,均可授权用户访问。​

    eToken PASS O​​TP 认证器 – 设计紧凑、OTP硬件令牌
    SafeNet​ Gold – 具有挑战应答功能的OTP硬件令牌
    IDProve 100​ –具有挑战应答功能的OTP硬件令牌

  • 软件与移动认证器

    软件与移动认证器

    金雅拓移动认证器将手机和平板电脑转变为第二种认证设备,免去了单独配置认证设备的必要。

    MobilePASS – 针对所有移动设备的OTP软件应用​
    IDProve 300 - 针对所有移动设备的OTP软件应用
    MP-1 - 针对所有移动设备的OTP软件应用

  • 智能卡

    智能卡

    强大、便捷易用的金雅拓智能卡利用传统的信用卡即可提供强大的多因素验证,帮助企业解决PKI安全问题,诸如远程访问、联网访问、密码管理、网络登录、企业徽章以及数字化签名和安全交易等。

    IDPrime – PKI智能卡家族系列
    SafeNet eToken 4100 – PKI智能卡
    I​​DCore – 开放的智能卡解决方案平台,用于与各类安全环境整合​
    IDClassic - 可用于非迷你型驱动认证或存储价值框架的智能卡​

  • 智能卡读取器

    ​智能卡读取器 

    IDBridge智能卡读取器提供便捷使用和固态安全的完美平衡,用于智能卡和网络服务之间的通信。​

    IDBridge – 便捷易用的智能卡读取器

  • USB PKI令牌

    USB PKI令牌

    金雅拓USB令牌使用PKI技术,能够生成并存储证书,例如受保护环境中的私人密钥、密码、数字许可证等,这个受保护环境由存储在可信任USB设备上的智能卡芯片来保证。.


    SafeNet eToken 5100 – 简洁的USB智能令牌
    SafeNet eToken 5200 - 简洁的USB智能令牌可用于无客户环境

  • 带外数据认证

    带外数据认证

    金雅拓带外数据认证(OOB)利用SMS或邮件等外部渠道,向用户发送动态密码​.

    MobilePASS – OOB认证器​​

  • 网格令牌

    网格令牌

    网格令牌网格令牌使终端用户输入屏幕上预设定图案对应的数字,生成一次性密码。

    GrIDSure – 网格令牌无需软​硬件
    ​​​​​​

​​​​​

​​"为何选择金雅拓身份和访问管理解决方案(IAM)?"

Identity and Access Management IconSafeNet 身份和访问管理解决方案允许企业使用强认证方式访问现需要密码进入的在线资源。支持RADIUS, SAML 2.0, APIs和专用代理, SafeNet 认证服务(SAS)具有灵活性和可扩展性保护您整个IT生态系统,包括:

  • VPNs
  • SaaS, Idaas 及 Ipaas 应用
  • 虚拟化环境(VDI)
  • 网站门户和基于云的应用
  • 本地网络
  • 物理和逻辑访问​
加强您的安全防护!注册SafeNet 认证服务(SAS)免费试用​​

 产品页

  • Challenges and Solutions to Enterprise Mobile Security - White Paper

    Challenges and Solutions to Enterprise Mobile Security - White Paper

    Studies show employees use three or more different devices for work on a daily basis and 89% of mobile users will access business applications using their personal devices. The rapid increase in mobile usage has many IT teams scrambling to get enterprise mobile security in line with current corporate standards.

    Read the whitepaper
  • A Security Survey of Strong Authentication Technologies

    A Security Survey of Strong Authentication Technologies - White Paper

    All authentication methods are based on providing the legitimate user with a method for proving his or her identity. Such “proof” can involve different form factors, such as something only the user knows (like a password) or something only the user has (like an external piece of hardware or the user’s biometric information). It could also be something that the user is, such as unique physical attributes, for example, a fingerprint or retinal scan.

    Read the white paper
  • Assessing the True Cost of Strong Authentication - White Paper

    Many organizations rarely look closely at the Total Cost of Operation of their authentication solution and instead make a decision heavily driven by the up-front purchase price. This approach to assessing authentication costs shows that infrastructure investments and management overheads dominate the total cost of the solution. Lowering these overheads, therefore, would reduce Total Cost of Operation. Cloud-based services are increasingly becoming an integral part of the enterprise, precisely because they lower costs and management overhead while increasing flexibility.

    Read the white paper
  • A4 Authentication for the Mobile Employee

    Employees are increasingly working out of the office; more of them are using mobile devices and a greater number of them are logging in to cloud applications to perform business tasks. In this ebook, we present five guidelines for supporting secure employee mobility.

    A4 Authentication for the Mobile Employee
  • Authentication Best Practices

    This white paper provides best practices guidelines and assessment criteria for organizations that are looking to implement strong authentication

    Download the white paper
  • Using Next Generation Authentication to Balance Security and User Experience

    Explore the current realities and challenges that IT administrators face and how the latest innovations in two-factor authentication can help enterprises successfully balance security and user experience.

    Download the solution brief
  • Anytime, Anywhere Secure Remote Access

    To accommodate flexible work arrangements, support traveling employees, retain expertise following office relocation, and keep pace with international work hours, organizations need to develop a secure VPN access strategy.

    Download the solution brief
  • Remote Access Authentication for a Mobile Workforce

    Today, more employees are working remotely on a wide variety of devices, requiring the use of the right remote access authentication solution, as our infographic details.

    Check out the infographic