• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
hid
4.3
55 Reviews (All time)
Review weighting


Browse HID Reviews

HID is present in 5 markets with 6 products. HID has 55 reviews with an overall average rating of 4.3.

Certificate Lifecycle Management (CLM)

Certificate Lifecycle Management (CLM) is the process of managing digital certificates from their creation to their expiration or revocation. Digital certificates are electronic credentials that verify the identity of individuals, devices, or organizations and enable secure, encrypted communication over networks. They are a fundamental part of Public Key Infrastructure (PKI), ensuring trust and data integrity in digital interactions. CLM involves key stages such as requesting, issuing, installing, monitoring, renewing, and revoking certificates. This process helps prevent service disruptions, security breaches, and compliance failures. CLM is used by a wide range of users including IT administrators, security teams, DevOps engineers, and compliance officers who rely on it to maintain secure and reliable digital environments.

HID has 1 product in Certificate Lifecycle Management (CLM) market
  • HID PKI-as-a-Service
    4.0
    1 Review

IT Security

IT Security refers to products and services that protect digital systems and data from cyber threats and unauthorized access. This category includes markets that focus on network security, identity management, data protection, and cloud security, enabling organizations to reduce risk, ensure compliance, and operate securely in a digital world.

HID has 1 product in IT Security market
  • HID Approve
    4.6
    2 Reviews

Indoor Location Services

Gartner defines the indoor location service market as “the hardware, software and service components that provide indoor location coordinates and services.” Indoor location solutions use differing hardware components, data collection methodologies, location data elements, location engine algorithms and architectures to achieve the core functionality of the indoor location market. Solutions provide the location of a static/mobile asset or person, as defined by the needs of the specific vertical market.

HID has 1 product in Indoor Location Services market
  • HID Location Services
    4.5
    35 Reviews

Password Management Tools

Password management (PM) tools are products that provide users with the means to reset their own passwords after an account lockout or when they forget their passwords. PM tools can also synchronize passwords for users across multiple systems, allowing users to access multiple applications with the same password.

HID has 1 product in Password Management Tools market
  • HID DigitalPersona Software
    5.0
    1 Review

User Authentication

Gartner defines user authentication as the journey-time process that provides credence in a claim to an identity established for a person for access to digital assets. User authentication is delivered by some combination of (a) an authenticator, (b) signals evaluation and (c) an authentication decision point, which may be from different vendors. User authentication is used to provide credence in an identity claim for a person already known to an organization. The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. Without effective authentication, the security of and trust in that person’s digital interactions are deeply undermined. User authentication is foundational to and protects the value of other functions within an organization’s identity fabric, namely: runtime authorization, especially segregation of duties (SOD), audit (individual accountability), and identity analytics.

HID has 2 products in User Authentication market
  • HID Global ActivID Tap Authentication (Legacy)
    4.1
    8 Reviews
  • HID IdenTrust
    4.0
    8 Reviews
Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply.
  • Community Guidelines
  • Listing Guidelines
  • Browse Vendors
  • Rules of Engagement
  • FAQ
  • Privacy
  • Terms of Service
©
 
©