Crossmatch and Accordant Technology Partnership to Bring DigitalPersona Authentication Software to Clients

New partnership delivers mobility, security and virtualization solutions to healthcare, financial services, and retail customers.

Crossmatch®, a globally-recognized leader in biometric identity management and secure authentication solutions and Accordant Technology, Inc., today announced a strategic partnership to offer advanced authentication to enterprise customers.

Accordant Technology will be an authorized reseller offering Crossmatch’s state-of-the-art DigitalPersona® software to its base of customers. Accordant specializes in helping organizations get the most out of their mobility and virtualization solutions. Security is a necessary component of both core technology areas.

“Virtualization is enabling organizations to better centralize control of their data and manage their devices,” says Anthony Graziano, Director of North American Channel Sales for Crossmatch. “But what can’t be overlooked is assuring the identity of the user at the far end. We’re excited about Accordant’s reach and expertise with security, mobility, everything is the Citrix domain, and now multifactor authentication with DigitalPersona.”

DigitalPersona is a comprehensive, integrated authentication solution that secures disparate applications and systems using a common administration and authentication interface. It provides for the security of all IT assets on-premises, in the cloud or some combination in between.

“Digital transformation is pushing an ‘access to everything mentality.’ One of Accordant’s key strengths is helping our customers secure their entire business from anywhere, at any time, and through any device. Crossmatch DigitalPersona gives us the advantage of truly being able to deliver on securing digital assets and people against the threat of identity compromise and inappropriate use,” says Tim Tyler; CEO.

Crossmatch’s Composite Authentication solution transcends 2FA and MFA offerings by delivering an optimal mix of factors enabling risk-based authentication policies that adapt to dynamic threat environments and increasingly complex IT environments.

About Accordant Technology

Accordant Technology is changing the way businesses leverage technology by focusing on the user experience and business outcomes. Accordant delivers secure virtual workspaces and cloud-based solutions with a commitment to providing 5 Star user experiences tailored to clients’ objectives.

Accordant application virtualization and hosting consultants and engineers use industry leading products and best practices to ensure seamless end user experiences. Strategically, Accordant stands at the crossroads of leadership, business and technology. We are committed to ensuring clients, users, partners and employees experience the best of all three. For more information, read Accordant’s blog:

About Crossmatch

Crossmatch® solutions solve security and identity management challenges for hundreds of millions of users around the world. Our proven DigitalPersona® Composite Authentication solution is designed to provide the optimal set of authentication factors to meet today’s unique risk requirements and afford complete enterprise authentication coverage. Crossmatch identity management solutions include trusted biometric identity management hardware and software that deliver the highest quality and performance required for critical applications. Our solutions support the financial, retail, commercial, government, law enforcement and military markets. With 300 employees and customers in more than 80 countries, Crossmatch sets the standard for innovation and reliability. Learn more:


Biometric Identity Management and MFA

Identity and access management, often referred to as IAM, is about defining and managing the access privileges and roles of certain network users, as well as the reasons users are granted (or denied) those privileges. The main purpose of the IAM system is to create one identity per person. Once the digital identity is created, it is maintained, monitored and modified through the user’s access lifecycle.

Now, the use of biometric identity management has been created, making the ability to monitor and manage access to certain parts of a business or even files and documents easier.

Common Uses for Biometric Identity Management

Some of the most common ways this technology is used today include:

  • Logical and physical access control (i.e. unlocking doors, weapon safety, logging into or out of accounts, etc.)
  • National security and surveillance
  • Forensics and investigations at crime scenes
  • Identification and authentication for payments cards, ATMs, kiosks, POS and more
  • Criminal identification and enrollment
  • Biometric passports, background checks, verification, identification, civil enrollment and national ID

These are just a few of the ways that this technology is used today. However, it isn’t the only high-tech method of protection information, physical property and other things.

Introducing MFA

MFA, or multi-factor authentication, is a process used by an individual or computer to prove identity and gain access to data or information using several authentication methods.

A multi-factor application is created by combining several pieces of evidence from different categories into some type of authentication mechanism. The identification items include:

  • Biometrics (i.e. your fingerprint or retina)
  • A token or smartcard
  • A password

This multi-layer approach to security help prevent hackers and attackers from gaining access to sensitive information or locations.

Use of MFA Today

There are currently countless websites utilizing MFA to protect customers. One example is Instagram, which released an MFA process, which allows users to receive a code via text that they have enter to gain access to their account.

The Benefits of Biometrics and MFA Used Together

By combining “something you are” (biometrics) with “something you have” (tokens and smartcards) and with “something you know” (pins and passwords), you can feel confident that it’s going to be virtually impossible for your portals and data to be breached and reached by unauthorized users.


The Rise of the Mobile Workforce: Are You Ready?

When it comes to workplace transformation, Citrix estimates that the number of companies enabling a mobile workforce will rise to 70% by the year 2020. Don’t get left behind in the race for digital transformation! Provide a simple, secure workspace for everyone on your team the right business technology, consulting, systems integration, and support.

Employees and remote team members need to be able to access critical documents and resources from any device, at any time. The virtualization and cloud solutions market is bustling with options, but only a select few allow for true flexibility for mobile workforces while protecting sensitive business information.

Implementing VDI and cloud solutions does not begin with planning and end with implementation. A 5 Star user experience with virtual workspaces and cloud solutions includes support, fulfillment, and customer satisfaction. When considering options for mobile workforce solutions, keep these processes in mind and ensure that you’re working with a team who understands the importance of access during these critical business periods:

  • Employee or Freelancer On-Boarding
  • Role and Title Changes
  • Off-Boarding or Project Removal

New employees should be able to be productive from day one without a significant investment from the IT team, and securing company or project information should be as easy as flipping a switch upon separation of an employee or the finalization of a project.

When selecting an enterprise VDI consultant, make sure they work with only the best-of-breed technology solutions, complete with support and service.

When considering a virtualization platform, security safeguards becomes a priority. Each new device and each new team member has the potential to weaken the perimeter as the cybersecurity threats expand. With so many devices and people accessing the network, the strategies to mitigate these risks must be in place from the beginning.

Secure application access management is critical for your organization, and malware is no longer a distant threat, with ransomware reigning supreme with phishing attacks and malicious document attacks. WannaCry and Petya attacks brought malware into the headlines, making cybersecurity a priority for today’s CIO and IT teams.

Policies are the key to security within your organization’s mobile workforce platform. An experienced virtualization expert can help you set up policies and guidelines in all of the following areas:

  • Device Policies: Define the make, model, and approved operating systems
  • Access: The team members who will be given access to remote workplace options
  • Compliance: Requirements and actions if violations occur
  • Security: Define applications and data for company monitoring purposes

Managing Storage
Along with proactively managing cybersecurity threats, today’s enterprise organization must also consider secure storage and backup options. Physical, in-house data storage centers are on the decline, as many organizations are turning to the cloud to house data. The cost of archiving all of this data in-house is becoming prohibitive, as it requires significant investments in hardware and software and time investments from the IT team.Cloud hosting and virtual servers are the primary sources of storage for virtualization platforms. In addition to files, these hosting options also give organizations access to memory and network bandwidth and connectivity to remote applications.

When implementing a new VDI solution, it’s important to ask about updates and bug fixes. Lack of proper support and maintenance can lead to network vulnerabilities, but the right IT consulting team will have support and maintenance processes in place.

In summary, when considering a platform to support a modern, mobile workforce, make sure your IT consulting team addresses simplicity, security, and storage.

Security in Virtual Workspaces (Citrix)

Virtual workspaces are a great tool for businesses. They allow remote access to company networks so that employees can use tools while out of the office. But how do you know that your virtual workspace is secure? How can you best protect your data? Citrix has a proven track record of security and ease of access for those who want to take their companies to the future.

How poor security can fail you
Virtual workspaces are an incredibly convenient tool, and they actually provide an added layer of security. While in the office it’s possible to keep an eye on your important data and files, making sure that your information is protected from people who will abuse it, the equation gets more complicated once you incorporate remote access. Employees might not use acceptable antiviral software, or they might not take proper precautions to protect their device. This could result in you losing sensitive data.

How Citrix works
Citrix is a software that takes every precaution when dealing with your information to keep you as secure as possible. It works by taking information from virtual workspaces and sending it to the Citrix cloud. From the cloud, it’s transferred to Citrix’s Technology Solution which includes secure netscalers, delivery controllers, and data storage. You are able to monitor use of your virtual workspaces with this tool, as well as run analytics and automate certain processes. Citrix uses strong data separation policies to best protect your sensitive information.

In this day and age where data leaks happen frequently and clients worry for their information’s safety, it is vital to take every step possible to make sure that you, and those that work with you, are protected. Constant security can sometimes be a headache, but with virtual workspaces through Citrix, it’s simple. Only using virtual workspaces that are secured by the best technology, and making sure to reinforce information security with employees will go a long way towards protecting your information. Citrix is a great, easy to use tool that can help you do just that, and it might just be the solution you’ve been looking for.

Growth spurs addition of Alan D. Watson to the Accordant executive leadership team

Accordant Technology CEO Tim Tyler has announced the appointment of a nationally-recognized IT executive to Accordant’s executive leadership. Alan D. Watson, Accordant’s newly announced President was previously Executive Vice President and Chief Information Officer of ChanceLight Behavioral Health, Therapy & Education, a Citrix Innovation Award Winner. Citrix awarded his previous work for collaboration, networking and virtualization to provide customized learning resources in a secure, regulatory compliant environment.

“We’re thrilled to welcome Alan to our team, as Alan’s real-world experience with the challenges of enterprise technology will bring direct benefit to our clients,” says Tyler. “Alan’s proven track record is compelling. As Accordant is growing and maturing, he’s both a vital and timely addition to our team.”

Watson speaks on behalf of Citrix at Executive Insights and national conferences. “In serving previous firms as CIO, I understand the challenges of the enterprise,” says Watson. “I’m eager to bring that perspective to help ensure Accordant clients end-user experiences are optimized.” Watson’s background includes a proven consulting track record in the highly regulated environments of healthcare and financial sectors.

Accordant has been recognized as experts in virtualization, application delivery and mobility for firms throughout the southeast. Accordant’s commitment to seamless end-user experiences has produced such outstanding outcomes that Accordant finds itself expanding into additional markets due to client demand. The addition of Watson as President affords Accordant further leadership scalability to address those demands.

Accordant Technology is changing the way businesses leverage technology by focusing on the user experience and business outcomes. Accordant delivers secure virtual workspaces and cloud-based solutions with a commitment to providing 5 Star user experiences tailored to clients’ objectives.

Accordant application virtualization and hosting consultants and engineers use industry leading products and best practices to ensure seamless end user experiences. Strategically, Accordant stands at the crossroads of leadership, business and technology. We are committed to ensuring clients, users, partners and employees experience the best of all three.

Tami Orrange


To serve our clients through enhancing the user experience by streamlining technology in a consistent and secure manner.

Get in touch with us!