rf IDEAS, a leading manufacturer of credential readers for authentication and logical access, is pleased to announce that select models of its WAVE ID® Plus, WAVE ID® Nano and WAVE ID® Nano OEM card reader families now support the FIDO2 NFC protocol. This technology brings seamless, passwordless authentication to security-critical enterprises in finance, healthcare, government, manufacturing, education and other markets.
WAVE ID®️️️️️️ Bio. It's MFA your way
More than 80% of data breaches are caused by stolen, weak or default passwords, and almost 70% go undetected for up to several months.
For 25 years and counting, rf IDEAS has been taking authentication solutions beyond the front door to where work gets done.
The global contactless smart card market is expected to grow at a compound annual growth rate of 18% through 2027.
There are hundreds of proximity and contactless smart card brands and types in use worldwide. WAVE ID card readers are compatible with nearly every one.
When a healthcare institution wanted to better integrate laptops into workflows, Lenovo and rf IDEAS teamed up to simplify the log-in and logout process with a tap-and-go badge reader system, making it more likely that the user will log out when moving away from the system. The badge reader is fully enclosed in the system, making it easy to clean.
Beyond the government cybersecurity executive order, every commercial enterprise needs to take action for a secure, productive future. Even businesses not directly affected by government-imposed cybersecurity orders are still at risk of cyberattacks. In fact, the danger is considerably higher today than it was just a year ago. As more government-related enterprises reinforce the systems that protect access to their digital infrastructure and data, hackers are turning their attention to commercial enterprises that have failed to recognize and repair the chinks in their armor.
Just as banking, insurance, and government leaders were forced to quickly ramp up cyber defenses in the past few years, manufacturing professionals must today make securing their technologies, production lines, facilities, and processes a top priority. As companies expand their connectivity and reliance on cloud computing, major security gaps emerge. And that means the potential for big problems.