News
A growth strategy built on passwordless authentication and international security standards
Hideez has announced its strategic priorities for 2026. Each of them reflects the vendor’s technological maturity and alignment with international cybersecurity standards. They include a new generation of hardware security keys, ISO 27001 certification, support for AI agent authentication, and stronger positioning in Europe amid the regulatory pressure of NIS2 and DORA. For system integrators and MSPs, this translates into concrete opportunities to meet customers’ regulatory requirements with a single solution.
Oleh Naumenko,CEO Hideez
ISO 27001: A new trust benchmark for the enterprise market
Hideez is completing the process of obtaining ISO 27001 certification, the leading international standard for information security management systems (ISMS). The standard defines how a company identifies risks, protects data, manages access, responds to incidents, and ensures business continuity.
For customers and partners in Europe and the United States, this certification primarily serves as independent verification from an accredited certification body: a third party has validated the company’s processes, confirmed compliance, and issued an internationally recognized certificate. This allows organizations to reference the certification in their audits, reports, and tender documentation. For companies building or demonstrating compliance with frameworks such as NIS2, DORA, or industry-specific standards, this significantly reduces the amount of evidence they must provide themselves.
Hideez Key 5: Centimeter-level proximity authentication and tap-and-go for shared workstations
The next-generation hardware security key, Hideez Key 5, will feature an updated USB-like design with next-generation Bluetooth support.
Roman BebeshkoSales Engineer BAKOTECH.
The USB-C connector also enables the key to function as a Bluetooth adapter, enabling tap-and-go. In this model, an employee holds a key up to another “receiving” key inserted into a USB-C port; the device instantly authenticates the user via Bluetooth, and a personal session opens with individual access rights. As soon as the employee leaves and removes the key, the session automatically ends, and the workstation returns to a locked state. No passwords, no manual actions, and no risk of an “open session left behind.”
In healthcare environments, where nurses or physicians move between dozens of workstations during a shift, this approach provides not only convenience but also a significant reduction in the risk of unauthorized access to patient data. This complies with GDPR requirements for data processing safety and industry standards’ recommendations, such as ISO 27799, for workstation security.
At the same time, all core functionality remains in place: Hideez Key 5 combines a password manager, an RFID or NFC card for physical access, and a FIDO2-certified device for fully passwordless login to systems, workstations, and web services.
AI agent authentication: Zero Trust in a world where not only humans act
Following the rapid growth and mass adoption of AI in the consumer space, these technologies are naturally moving into corporate environments. Employees increasingly rely on AI agents to delegate routine or complex tasks, interacting with internal services, documents, analytics systems, CRM platforms, and other business applications. In such scenarios, the agent performs actions initiated by a human employee, creating a new class of risk: traditional access control mechanisms do not always clearly define which resources an agent may access, for how long, and with what permissions.
Hideez intends to expand its authentication and access control platform to support AI agent use cases through clearly defined control mechanisms aligned with the Zero Trust model:
● Initiator identification. The system records the context of each session: which employee initiated the agent, what actions are permitted, which data can be accessed, and for how long. ● Action restrictions. Activating an AI agent requires passwordless, cryptographically secure authentication from the human user. ● Audit trail. Every action performed by the agent is linked to its human initiator, ensuring transparency and regulatory compliance.
For companies subject to NIS2 or DORA requirements, this capability is particularly critical. Both regulations require documented access control to critical systems, regardless of whether the acting entity is a human user or a software agent.
NIS2, DORA, and passwordless: The Hideez approach
Two regulatory frameworks are fundamentally reshaping the cybersecurity landscape in the European Union. NIS2 significantly expands cyber resilience requirements to a broader range of industries, while DORA establishes strict operational resilience standards for the financial sector. Both frameworks emphasize multi-factor authentication, privileged access management, and the ability to document and restore access control following incidents.
This is where the Hideez approach, based on hardware FIDO2 keys, passwordless authentication, and on-premises or private cloud deployment options within Europe, helps organizations meet core regulatory requirements. For system integrators and MSPs serving customers in regulated industries, this means the ability to offer a comprehensive solution rather than a collection of disconnected point products.
BAKOTECH is the official distributor of Hideez solutions, whose products directly enable medium and large organizations to meet EU regulatory requirements.
With ISO 27001 certification, a new generation of hardware keys, and support for AI agent authentication, Hideez isn’t just “another MFA product.” It’s a comprehensive platform that facilitates compliance with international requirements, such as NIS2 and DORA, and local regulatory standards, with clear ROI justification and minimal barriers to adoption.