Header-Banner

Certificate-based PKI Smart Cards

Access Control via Smart Card Authentication

SafeNet’s range of certificate-based smart cards offer strong multi-factor authentication in a traditional credit card form factor and enable organizations to address their PKI security needs. SafeNet’smart cards offer a single solution for strong authentication and applications access control, including remote access, network access, password management, network logon, as well as corporate ID badges, magnetic stripes and proximity. 

SafeNet’s certificate-based smart cards meet the highest security standards, including FIPS 140-2 and Common Criteria, and enable compliance with security regulations like HIPAA, HSPD-12, SOX, GLBA, FFIEC, Basel II, PCI, and HITECH.

Explore Our PKI Smart Cards:

eToken PRO Smart Card

SafeNet eToken PRO PKI Smart Card

The eToken PRO Smart Card is a certificate-based strong authentication solution that enables strong authentication, password management, secure digital signatures, and data security solutions.

View Product Details

eToken 4100 Smart Card

SafeNet eToken 4100 Smart Card

SafeNet eToken 4100 offers highly secured strong two-factor authentication ensuring authorized user access to sensitive corporate networks and online business applications, as well support for advanced solutions such as digital signature and pre-boot authentication.

View Product Details

Smart Card 650

SafeNet Smart Card 650

The most secure certificated-based smart card available, the Smart Card 650 securely stores users' authentication credentials and supports key generation and storage, encryption/decryption, & digital signature processing.

View Product Details

Smart Card 400

SafeNet Smart Card 400

SafeNet's Smart Card 400 authenticator allows for a high level of security by offering wide application support, biometric capabilities, and secure crypto key storage.

View Product Details

uSmart Card 650 for Government Mobile Security

uSmart Card 650 for Government Mobile Security

The SafeNet uSmart Card 650 (uSC650) integrates the Smart Card 650 (SC650) and Trust Platform Module (TPM) functionality in a micro SD form factor targeted for mobile devices.

View Product Details

View Learn MoreResource Library

Smart Card Authentication Resources

Learn more about how to use our PKI smart cards to enhance your access control security, provide users with the means to protect their identities, and address both internal and external threats to your organizaton's data.

SafeNet Smart Card Icon

Future-Proofing Your Authentication Infrastructure [White Paper]

As the proliferation of cloud services and enterprise-connected mobile devices continues, the process of deploying and maintaining authentication threatens to grow more costly and complex. This paper uncovers key strategies organizations can employ in order to adapt to today’s evolving IT dynamics, while persistently safeguarding sensitive corporate assets.

Download the White Paper
SafeNet Smart Card Icon

Migros: Secure Network Access and Single Sign On to Multiple Applications and Portals [Case Study]

Using SafeNet’s certificate-based eToken smart card combined with SafeNet’s PKI client middleware and Single Sign On (SSO) software, Migros-Genossenschafts-Bund, Switzerland's leading retailer, successfully implemented a comprehensive security solution that went far beyond their initial need for a solution intended to simplify logon procedures.

Download the Migros Case Study
SafeNet Smart Card Icon

Next-Generation Authentication [White Paper]

The demands for heightened security through the use of multi-factor authentication are pressing, but so is the need to control budgets and give users convenient access to the data and services they need.

Download the White Paper
SafeNet Smart Card Icon

Hardware and Software Authentication [Decision Guide]

To support today’s organizations, IT departments need to foster the productivity of remote and mobile users, while safeguarding the security of sensitive assets and systems. For these reasons, strong authentication mechanisms are increasingly being employed. This paper compares the strengths and weaknesses of hardware- and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.

Download the Decision Guide
View OverviewResource Library
Auth Migration Guide WP

Migros ensures single sign on to multiple web portals with eToken PRO smart card
CTA - 2014 Gartner Magic Quadrant for User Authentication