Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/project/resource/index.aspx?aid=17&t=isc-west-2024-news-and-product-updates
INSIGHTS

ASSA ABLOY acquires IdenTrust

ASSA ABLOY acquires IdenTrust
ASSA ABLOY has acquired IdenTrust, a provider of digital authentication solutions. IdenTrust provides advanced cryptology systems, recognized by global financial institutions, government agencies and corporations around the world.

ASSA ABLOY has acquired IdenTrust, a provider of digital authentication solutions. IdenTrust provides advanced cryptology systems, recognized by global financial institutions, government agencies and corporations around the world. IdenTrust is both a Trust Framework and an Identity Provider. Solutions are based on Public Key Infrastructure (PKI).

“This acquisition reinforces our strategic vision of being the world leader in secure authentication and issuance of secure identities. IdenTrust gives us valuable knowledge and creates growth opportunities on a rapidly growing market,” says Johan Molin, President and CEO of ASSA ABLOY.

“The acquisition of IdenTrust complements the previous acquisition of ActivIdentity and considerably strengthens our HID Global value proposition around secure authentication, providing us with a Trust Framework for issuing, authenticating and using digital identities based on open standards,” says Denis Hebert, Executive Vice President ASSA ABLOY and Head of business unit HID Global.

IdenTrust was founded in 1999 and has 63 employees. The head office is located in San Francisco. Sales are expected to reach $14 M in 2014. Initially, the acquisition will be slightly dilutive to earnings per share.

Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to:
Most Viewed Articles