Guides & Whitepapers

Here you will find a mix of guides, reports and whitepapers available as downloads.

Access control Cards & credentials

Guide: How to use one Smart ID for all physical and digital access

3 October, 2017
Do you want your users to be able to identify themselves visually, log in, open doors, sign documents, make payments and use follow-me printing – w...
Authentication Cards & credentials

Guide: How to use your organization’s ID badges to enable electronic signatures

19 June, 2017
A critical puzzle piece when digitizing in the public sector is enabling reliable electronic signatures. This can be easier and cheaper than you mi...
Cards & credentials

Guide: How to choose the right access card and key fob acquisition method

24 May, 2017
You can either make your access cards, photo ID badges and key fobs on premise, or you can outsource the production and buy ready-to-use credential...
Access control Lifecycle management

Whitepaper: Why use a central system for physical identity and access management (PIAM)?

24 April, 2017
A typical organization has a large number of identities to manage, and identities need to be added and removed when new employees join the organiza...
Access control

Guide: How to choose the right physical identity and access management (PIAM) system

24 April, 2017
A centralized physical identity and access management (PIAM) system makes life easier for everyone in your organization.

Guide: Turn GDPR from foe to friend

20 February, 2017
The EU’s new General Data Protection Regulation (GDPR) aims to align the privacy regulatory environments in Europe. Many organizations are uncertai...

Whitepaper: How to choose the right security for LTE (4G) infrastructures

25 January, 2017
Mobile network operators meet many challenges in protecting the LTE infrastructure, and many more challenges will come in the future. This whitepap...
Access control Authentication

Whitepaper: How to Upgrade to Mobile Two-Factor Authentication (2FA) in Online Banking

30 November, 2016
In online banking, high security for authentication and signatures is required – but the solution also has to be user-friendly. Mobile two-factor a...