Skip to main content
TrustRadius
HID DigitalPersona

HID DigitalPersona
Formerly Crossmatch

Overview

What is HID DigitalPersona?

HID DigitalPersona (formerly Crossmatch) provides a comprehensive multi-factor authentication solution. The vendor’s value proposition is that their solution frees users from cumbersome login activities while making it easy for an IT Team to secure access to their networks, data and…

Read more
Recent Reviews
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

HID DigitalPersona

$3.75

On Premise
per user per month

Entry-level set up fee?

  • Setup fee required

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Details

What is HID DigitalPersona?

The HID DigitalPersona multi-factor authentication software offers a new way to provide authentication services to users. Whereas traditional 2FA/MFA solutions are stuck on “what you have/what you know”, DigitalPersona leverages an array of authentication methods to access public and corporate network resources. Enterprise users can gain access to their cloud applications, such as Microsoft 365, VPNs, corporate networks, Windows desktops, and Citrix applications . Consumers can confirm their identity and authenticate transactions.

Balancing security and usability, HID DigitalPersona boasts one of the widest arrays of authentication factors in the industry. This includes one-time passwords, mobile-based push, smartcards, security keys, risk- and context-based methods, and biometrics, such as fingerprint, face, and behavioral keystroke.

HID DigitalPersona Competitors

HID DigitalPersona Technical Details

Deployment TypesOn-premise
Operating SystemsWindows
Mobile ApplicationApple iOS, Android, Windows Phone
Supported CountriesMost Countries except companies included in US Embargo

Frequently Asked Questions

HID DigitalPersona (formerly Crossmatch) provides a comprehensive multi-factor authentication solution. The vendor’s value proposition is that their solution frees users from cumbersome login activities while making it easy for an IT Team to secure access to their networks, data and applications.

The Okta Identity Cloud and Imprivata OneSign are common alternatives for HID DigitalPersona.

Reviewers rate Usability and Support Rating and Implementation Rating highest, with a score of 9.

The most common users of HID DigitalPersona are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(148)

Attribute Ratings

Reviews

(1-25 of 81)
Companies can't remove reviews or game the system. Here's why
Dave Fromdahl | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use HID DigitalPersona password manager to log into our accounting and utility billing software if that is what is being asked. It is just password substitution, though. It just makes access easier, not necessarily more secure. We also use the password manager via biometric login to access our bank accounts and such.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
HR information system(HRIS), Payroll, medical and training records among other sensitive employee data are stored in our HIRS, it assist i protecting this system Cloud Based app, It Aids in the security of our cloud based apps, which include our employee performance management system and applicant tracking system. Application used onsite- HID DigitalPersona provides protection for our onsite applications, which include our access control and time and attendance systems.
Score 9 out of 10
Vetted Review
Verified User
We are utilizing HID DigitalPersona to secure: Windows Operating Systems (Providing authentication and access control for desktops and laptops running Windows) .Cloud Applications (Safeguarding access to various cloud-based applications critical to our operations). Mobile Devices (Extending security measures to authenticate and protect access on mobile devices). VPN and Network Access (Ensuring secure connections to our organization's network and associated resources). On-Premises Applications (Protecting access to essential on-premises applications used within the organization).
Score 10 out of 10
Vetted Review
Verified User
Incentivized
On my Windows laptop, I log in using a HID DigitalPersona. In comparison to having to remember and enter my password, this is much faster and more practical. When connecting to my VPN, I authenticate using HID DigitalPersona. This aids in guarding against unauthorized access to my VPN. I access my cloud-based applications using HID DigitalPersona which refrains me from remembering the passwords.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
HID DigitalPersona protects Windows-based systems, cloud and mobile applications, VPNs, smart cards, single sign-on solutions, biometrics, and on-premises applications, by providing comprehensive security coverage.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We were protecting Windows desktops and laptops. The idea behind having multifactor authentication at login is to protect local data sitting on each device and adding another layer of security for legacy on-premises applications that do not support multifactor authentication. We only used DigitalPersona with Windows 10 and had no issues upgrading to different major released of Windows 10.
Ousama Bziker | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We use HID DigitalPersona password manager to log into our accounting and utility billing software. Also, password substitution does not guarantee security, but it does make access easier. We also use the password manager via biometric login to access our bank accounts and such.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Currently, we use this application as more of a secure password vault with biometric capabilities. There are several third-party applications that we use this software to protect. We also have built templates that will work with various websites that our organization utilizes. This gives the user ease of access to those resources via their finger on the reader. Hence, reducing the time it takes to log into these applications.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
All CJIS applications in our Police Department are protected and that helps us with compliance. As the officers would not be able to login to interface with their computers at the Operating System level, all applications on their mobile patrol computers are protected. Some are local web, some are cloud-based, and some was even legacy mainframe... without authenticating through DP, none were available.
Score 5 out of 10
Vetted Review
Verified User
Incentivized
We are using this with Windows logon, a large number of browser-based applications, Citrix, our COR application, and many more that I am just not able to come up with at this time. This has always worked great in IE and Edge, but the reliability suffers with the Chrome Extension.
Return to navigation