Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

HID Origo is a cloud-based platform developed by HID Global that facilitates the creation of integrated physical access control solutions by technology partners. This innovative platform not only enhances service consistency but also transforms the delivery of access control systems. Furthermore, HID Origo paves the way for the implementation of adaptable subscription models while simultaneously lowering expenses and boosting operational productivity. Rely on a secure framework supported by leading cloud service providers, recognized through industry certifications, and delivered according to HID Global’s service agreements and support structures. In one centralized location, users can access and manage a reliable network of cloud-connected access control devices, applications, and secure mobile identities. Leveraging data effectively ensures a smooth user experience, supports operational efficiency, and informs strategic business decision-making. Ultimately, HID Origo delivers a robust and scalable infrastructure that guarantees exceptional service quality and reliability. With its comprehensive capabilities, HID Origo empowers organizations to navigate the complexities of modern access control with confidence and ease.

Description

Sima offers more than merely blocking unauthorized individuals; it serves as a sophisticated cloud-based Access Control reader that prioritizes both security and user experience. Capable of processing mobile credentials like QR codes alongside facial biometrics, Sima's integrated software can provide either single-factor access through QR codes or multi-factor authentication via facial recognition for enhanced security tailored to specific facility needs. We are committed to safeguarding your privacy rigorously. Our facial recognition technology enables us to authenticate identities effectively, ensuring that access is granted only to verified individuals. The facial data collected is retained solely for identification purposes on our secure servers, and rest assured, your personal information, including images, will remain confidential and will not be disclosed to any third parties. Additionally, we continuously update our security measures to adapt to evolving threats, ensuring that your access remains both secure and seamless.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Feenics Access Control
Genea Access Control

Integrations

Feenics Access Control
Genea Access Control

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

Free
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

HID

Founded

2009

Country

United States

Website

www.hidglobal.com/solutions/cloud-based-physical-access-control

Vendor Details

Company Name

Active Witness

Founded

2018

Country

Canada

Website

activewitness.com

Product Features

Product Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Physical Security

Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues

Visitor Management

Alerts/Notifications
Badge Management
Document Management
ID Scan
Pre-Registration
Registration Management
Self Check-in
Visitor Tracking
Watch List

Alternatives

Alternatives

Origo Reviews

Origo

Third Corner
Knomi Reviews

Knomi

Aware
Protecsys 2 Suite Reviews

Protecsys 2 Suite

Horoquartz
OrigoDB Reviews

OrigoDB

Origo