Crossmatch and Accordant Technology Partnership to Bring DigitalPersona Authentication Software to Clients

New partnership delivers mobility, security and virtualization solutions to healthcare, financial services, and retail customers.

Crossmatch®, a globally-recognized leader in biometric identity management and secure authentication solutions and Accordant Technology, Inc., today announced a strategic partnership to offer advanced authentication to enterprise customers.

Accordant Technology will be an authorized reseller offering Crossmatch’s state-of-the-art DigitalPersona® software to its base of customers. Accordant specializes in helping organizations get the most out of their mobility and virtualization solutions. Security is a necessary component of both core technology areas.

“Virtualization is enabling organizations to better centralize control of their data and manage their devices,” says Anthony Graziano, Director of North American Channel Sales for Crossmatch. “But what can’t be overlooked is assuring the identity of the user at the far end. We’re excited about Accordant’s reach and expertise with security, mobility, everything is the Citrix domain, and now multifactor authentication with DigitalPersona.”

DigitalPersona is a comprehensive, integrated authentication solution that secures disparate applications and systems using a common administration and authentication interface. It provides for the security of all IT assets on-premises, in the cloud or some combination in between.

“Digital transformation is pushing an ‘access to everything mentality.’ One of Accordant’s key strengths is helping our customers secure their entire business from anywhere, at any time, and through any device. Crossmatch DigitalPersona gives us the advantage of truly being able to deliver on securing digital assets and people against the threat of identity compromise and inappropriate use,” says Tim Tyler; CEO.

Crossmatch’s Composite Authentication solution transcends 2FA and MFA offerings by delivering an optimal mix of factors enabling risk-based authentication policies that adapt to dynamic threat environments and increasingly complex IT environments.

About Accordant Technology

Accordant Technology is changing the way businesses leverage technology by focusing on the user experience and business outcomes. Accordant delivers secure virtual workspaces and cloud-based solutions with a commitment to providing 5 Star user experiences tailored to clients’ objectives.

Accordant application virtualization and hosting consultants and engineers use industry leading products and best practices to ensure seamless end user experiences. Strategically, Accordant stands at the crossroads of leadership, business and technology. We are committed to ensuring clients, users, partners and employees experience the best of all three. For more information, read Accordant’s blog:

About Crossmatch

Crossmatch® solutions solve security and identity management challenges for hundreds of millions of users around the world. Our proven DigitalPersona® Composite Authentication solution is designed to provide the optimal set of authentication factors to meet today’s unique risk requirements and afford complete enterprise authentication coverage. Crossmatch identity management solutions include trusted biometric identity management hardware and software that deliver the highest quality and performance required for critical applications. Our solutions support the financial, retail, commercial, government, law enforcement and military markets. With 300 employees and customers in more than 80 countries, Crossmatch sets the standard for innovation and reliability. Learn more:


Biometric Identity Management and MFA

Identity and access management, often referred to as IAM, is about defining and managing the access privileges and roles of certain network users, as well as the reasons users are granted (or denied) those privileges. The main purpose of the IAM system is to create one identity per person. Once the digital identity is created, it is maintained, monitored and modified through the user’s access lifecycle.

Now, the use of biometric identity management has been created, making the ability to monitor and manage access to certain parts of a business or even files and documents easier.

Common Uses for Biometric Identity Management

Some of the most common ways this technology is used today include:

  • Logical and physical access control (i.e. unlocking doors, weapon safety, logging into or out of accounts, etc.)
  • National security and surveillance
  • Forensics and investigations at crime scenes
  • Identification and authentication for payments cards, ATMs, kiosks, POS and more
  • Criminal identification and enrollment
  • Biometric passports, background checks, verification, identification, civil enrollment and national ID

These are just a few of the ways that this technology is used today. However, it isn’t the only high-tech method of protection information, physical property and other things.

Introducing MFA

MFA, or multi-factor authentication, is a process used by an individual or computer to prove identity and gain access to data or information using several authentication methods.

A multi-factor application is created by combining several pieces of evidence from different categories into some type of authentication mechanism. The identification items include:

  • Biometrics (i.e. your fingerprint or retina)
  • A token or smartcard
  • A password

This multi-layer approach to security help prevent hackers and attackers from gaining access to sensitive information or locations.

Use of MFA Today

There are currently countless websites utilizing MFA to protect customers. One example is Instagram, which released an MFA process, which allows users to receive a code via text that they have enter to gain access to their account.

The Benefits of Biometrics and MFA Used Together

By combining “something you are” (biometrics) with “something you have” (tokens and smartcards) and with “something you know” (pins and passwords), you can feel confident that it’s going to be virtually impossible for your portals and data to be breached and reached by unauthorized users.



To serve our clients through enhancing the user experience by streamlining technology in a consistent and secure manner.

Get in touch with us!