Document Library

Secure Channel Downgrade in Encoders/Readers Security Advisory Secure Channel Downgrade in Encoders/Readers
Sensitive Data Extraction from Reader Configuration Cards Security Advisory Sensitive Data Extraction from Reader Configuration Cards
Using an HID Badge with Electric Vehicle Charging Services White Papers Using an HID Badge with Electric Vehicle Charging Services
Unpacking CJIS MFA Requirements White Paper White Papers Unpacking CJIS MFA Requirements White Paper
Infographic: 10 Key Use Cases of Facial Recognition to Modernize Healthcare Infographic Infographic: 10 Key Use Cases of Facial Recognition to Modernize Healthcare
Case Study: RISI Technologies Takes Application Development to the Next Level with HID Mobile Access® Technology Case Studies Case Study: RISI Technologies Takes Application Development to the Next Level with HID Mobile Access® Technology
Elevating ePassport Security With Public Key Infrastructure (PKI) White Paper White Papers Elevating ePassport Security With Public Key Infrastructure (PKI) White Paper
HID Physical Access Control Solutions: Streamlined Solutions to Power Metro System Security Brochure Brochures HID Physical Access Control Solutions: Streamlined Solutions to Power Metro System Security Brochure
An HID Overview: Six Steps to Strengthen the Supply Chain Executive Brief An HID Overview: Six Steps to Strengthen the Supply Chain
Identity Documents Security — A Layered Defense Is the Best Defense White Paper White Papers Identity Documents Security — A Layered Defense Is the Best Defense White Paper
Modernizing Organizations with HID Visitor Manager Executive Brief Modernizing Organizations with HID Visitor Manager
10 Reasons Why Facial Recognition is Best Practice for Patient Identification Infographic Infographic 10 Reasons Why Facial Recognition is Best Practice for Patient Identification Infographic