解决方案

用于 CJIS 合规性的多重身份验证

确保警察局及其他执法机构安全、合规、高效地访问刑事司法信息 (CJI)。

简单便捷的 CJIS 合规 MFA

随着警察和执法机构越来越多地采用新技术,非法访问敏感公民数据、犯罪历史和机动车信息的风险日益增加。 与此同时,需要确保授权人员快速便捷地访问这些信息。

使用 HID 安全便捷的多重身份验证 (MFA) 解决方案,满足刑事司法信息服务 (CJIS) 身份验证和审计要求。 易于使用,轻松扩展,帮助您确保刑事司法信息 (CJI) 安全,同时确保执法人员随时随地高效访问敏感信息。

主要优点

badge and lock icon

快速安全地访问敏感数据

致力帮助各种大小型机构满足 CJIS 要求,深受客户信赖,为所有访问 CJI 的设备提供全面保护。
connected puzzle icon

适合您的预算、需求和系统

丰富多样的身份验证产品组合,包括智能卡(用于解锁门和数据)、密钥和移动应用程序,为您量身定制 MFA 解决方案。
clipboard icon

与时俱进,满足不断变化的要求

专为重点监管行业开发的便捷解决方案,轻松满足合规和审计要求。
police officer using laptop in car

确保应用程序和设备的安全访问

从移动设备、笔记本电脑或 PC 安全访问犯罪历史、指纹和机动车记录数据库。

确保所有设备(无论是否共享)和地点身份验证策略的一致性。

CJIS 合规 MFA 部署

使用便捷的 MFA 解决方案,在保护数据的同时,确保关键执法和行政任务的顺利执行。 根据您的需求、预算和现有系统,选择适合的 MFA 部署路径:

Something you know Password PIN Security code Something you have Smart card Security key Mobile device Token Something you are Fingerprint Facial scan + or

安全可靠的身份验证解决方案

HID 提供多种身份验证方法来满足身份安全需求,包括 FIDO2 和 PKI。

快速适应以实现合规

仅需几天即可完成部署,不会干扰机构的正常运转。 确保数据和网络安全性符合 CJIS 的 MFA 标准,并遵守 NIST 800-63 数字身份指导准则。

police officer using phone in car

凤凰城警察局的安全性和移动性

借助 DigitalPersona,美国亚利桑那州凤凰城警察局得以在执法现场或办公室快速安全地访问犯罪记录,同时满足 FBI 对移动设备的 CJIS 要求。

police officer using laptop in car

HID 帮助哥伦比亚县警长满足 CJIS 要求

Crescendo 智能卡和凭证管理系统帮助哥伦比亚县警察局全面提升安全性,摆脱用户名和密码束缚,同时满足 FBI 的 CJIS 要求。

行业领先体验

数十年来,HID 一直致力于为政府机构提供高级身份验证安全解决方案。 我们的高级 MFA 解决方案征服了各种复杂的 IT 环境,赢得了众多客户的信赖。

Award-Winning MFA Solution

选择适合的解决方案:CJIS 合规最佳实践

不同的机构需要不同的 MFA 解决方案。 使用以下最佳实践,选择适合您的解决方案:

  • 支持 MFA 的基础设施
    许多基于软件的解决方案都可支持现有身份验证方法,包括物理门禁卡和移动设备。 但是,要最大限度提升安全性,最好选择支持 PKI 或 FIDO 技术的解决方案。
  • 使用便捷
    安全的 MFA 解决方案不一定要多复杂,甚至不必联网。 选择简单易用的身份验证解决方案。
  • 符合 FIPS 标准的解决方案
    对于联邦政府机构(以及实施 FIPS-201 标准的机构),需要选择符合 FIPS-140-2 标准的解决方案。 最好选择符合 FIPS 标准的供应商。
2 police officers

常见问题

1. When is MFA required?

MFA is required whenever you use a device — whether agency issued or personal — to access criminal justice information (CJI), including:

  • Workstations that are connected to the same network as a CJI file repository or database 
  • Devices that store CJI data or could store CJI (i.e., that contain an application that caches the data or could be used to download it)
  • Applications that contain CJI 

HID recommends that organizations use MFA to protect all the data that they generate, store or access.

2. Do I need AAL2/Phishing-resistant MFA?

Authenticator Assurance Level 2 (AAL2) MFA — also referred to as phishing-resistant MFA — offers a higher level of security but also comes with stricter specifications. Although it is only required for organizations that implement PIV-I or CIV compliant credentials, HID strongly recommends it as a way to strengthen security without much extra expense or effort.

3. Do I need FIPS-140-2 certification?

The CJIS Security Policy requires FIPS-140-2 certification only for federal government entities — or organizations that choose to implement FIPS-201 standards. However, as you look for MFA solutions, it’s worth seeking vendors that comply with FIPS standards, as this indicates their adherence to state-of-the art security protocols.

4. What authentication methods can I choose if I work with HID?

HID offers a wide range of authentication methods including physical access cards, smart cards, security keys, biometrics, one-time passwords (OTPs) and mobile authenticators. These options make it easy to safeguard data without standing in the way of critical law enforcement operations.

5. How can HID help with CJIS audits?

HID technologies are trusted by large and small agencies, and our professional services advisors have decades of experience customizing MFA solutions that address regulatory requirements.

6. Can HID’s MFA solutions integrate with our existing security systems?

Yes. HID’s MFA solutions seamlessly integrate with physical access cards, mobile devices and digital security systems like VPNs, cloud services and legacy applications. This integration makes it easy for agencies to unify physical and digital security — and, in many cases, leverage the authentication methods and form factors you already have in use.

7. What sets HID’s MFA solutions apart from other providers?

HID’s MFA solutions stand out for their support of leading technical standards (FIDO2, PKI, OATH) and a flexible design that makes it easy to customize the right path for each user. With decades of experience in government security, HID delivers globally trusted, user-friendly solutions that meet your specific needs while complying with changing requirements.

document icon

Unpacking CJIS MFA Requirements

Learn what’s behind the mandate, what information you need to protect and how your organization can find the right path to CJIS compliance.

Read the white paper
paper and pen icons

The Top 5 Questions About MFA for CJIS (And Their Answers)

Get answers to the most common questions on the new requirements to help you navigate the choices and challenges involved with implementing MFA for CJIS.

Read the blog

需要入门帮助?

我们的专家随时帮助您的组织确定您的第一步。

让我们开始吧
微信