Identiv 2020 (1)
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Q3 2020
IDENTIV
EDITION
Smart Security,
Smarter World
Learn how Identiv is helping organizations
around the world get back to work
PLUS
Learn how you
can use
access control
to contact
trace.
In This Together
Top tips and solutions for staying safe, smart, and
secure during this time of transition.
3
5
10
As we navigate these unprecedented times, Identiv is deeply focused on the
health, safety, and well-being of our team, partners, and customers. None of us
knows exactly the extent or duration of what lies ahead. For all of us, this is a time
of concern for our employees, our friends, and our families, and uncertainty
around the economic impacts on our partners and customers.
While doing everything possible to protect everyone’s health and safety, we’re
also committed to supporting our partners and customers. We’ve implemented
business continuity plans to ensure we’re providing service in every way possible.
We’re leveraging our global locations and supply chain to continue supplying our
mission-critical security and transponder solutions to government and commercial
customers. We’re also using this time to keep in touch and ask how we can help;
we’re still hard at work guiding our business and product direction. It’s not
business as usual — it’s doing everything we can, with you, to ensure we ALL
bounce back stronger, regardless of how long the health and economic impact of
this virus lasts.
As the situation continues to develop, we plan to remain fluid and support those
that are most affected. We’re all in this together.
We wish you, your families, and your communities good health.
S T E V E N H U M P H R E Y S
CEO, Identiv
IDENTIV EDITION |2
www.identiv.com
Y O U R
TOUCHLESS
WORKSPACE
TOUCHLESS
WORKSPACE
As businesses open up and people around the
world return to work, it’s critical to have processes
and solutions in place that keep employees and
visitors feeling safe, comfortable, and confident.
With the threat of COVID-19 still
genuine, frictionless, hands-free
solutions are a crucial part of any
organization’s efforts to create a
healthier, more hygienic environment.
But what exactly is frictionless access
control? Frictionless access control is
a way to permit access to an area
without interfering with the user’s
experience. In essence, the goal is to
make the entire process easier.
Employees no longer have to carry a
badge or search through their
belongings to present credentials to a
reader.
A well-designed access control
system should allow people to go
about their daily lives freely, but still
provide peace of mind when it comes
to security needs. Regardless of the
ease of a platform, it needs to deliver
an adequate level of protection to
eliminate unauthorized access.
Mobile Apps as Credentials
Mobile applications leverage
Bluetooth and capacitive technologies
to allow for complete frictionless
access. Loaded on to a user’s smart
device, the mobile application acts as
a physical credential. An employee
can keep their mobile device in their
pocket, then wave their hand near the
reader, and the door unlocks. Since
most of us are glued to our mobile
phones, organizations can expect to
see a sharp decline in those who
forget their credential at home.Some
advanced systems have hit the
market that don’t require a reader at
the door.
The software-based architecture uses
the mobile device’s location to
determine a person’s proximity to the
door for hands-free ingress and
egress. How’s that for a “clean”
access control authorization process.
No-Touch Attendance
Frequent touchpoints, like punch
clocks, can easily be replaced by
contactless technology. Smart card
readers with multiple frequency
options and a keyboard emulation are
perfect for employers who use a
mixture of techniques for logical
access. Integrating easily with most
time and attendance systems,
employees tap the card to the reader
to clock in for the day. This process
simplifies the user experience and
also makes it easier for employees to
focus on the day at hand.
Look, Ma! Nearly Hands-Free!
Near-field communication (NFC) and
125 kHz low-frequency (LF) proximity
technology have something in
common: you can use them to get
near an access point without ever
touching it. These types of
transponders create a contactless
transaction and connect electronic
devices with a simple tap-and-go
model.Are you tired of reaching for
your phone or card every time you
need to gain access to a parking
garage, building, room, or elevator?
Well, we’re here to save the day. A
wearable passive radio frequency
identification (RFID) device can be
used instead (and since it’s
impervious to moisture, it can be
especially helpful during those 20
IDENTIV SOLUTIONS
FOR A SAFE, SECURE,
FRICTIONLESS WORK
ENVIRONMENT
MobilisID: a smart frictionless
access control, no touching
required.
uTrust 3721: Out-of-the-box,
this smart card reader can
integrate with most time and
attendance systems.
uTrust Proximity Wristbands:
Our wearable wristband keeps
access where you need it.
Hirsch Velocity Software with
Contact Tracing can pull a
report of everyone who
entered the same door who
can then be notified to either
get tested or self-quarantine.
second hand washings).
When choosing to invest in any type
of frictionless access control, it is vital
to keep in mind that the system needs
to adhere to your internal
requirements and must have room to
grow over time.
We don’t fully know how the pandemic
will reshape the workplace, but we do
know it is accelerating digital
transformation. Overall, frictionless
access control will continue to see
increased demand even after the
pandemic, as more organizations
move away from older technologies
and make way for more secure
techniques.
Remote Workers, Remote Security
Business leaders require the ability to
manage their operations from any
location. The option of remote
management is no longer a luxury; for
some businesses, it is a necessity. This
is a function that is easily provided
through cloud-based architectures.
Administrators that work remotely reap
benefits through the cloud, with the
ability to manage and alter the system
as needed through a web-based portal.
The cloud can offer peace of mind by
allowing security personnel to monitor
the system health and be informed of
any errors or problems while away from
the office. An issue that is detected
early can prevent downtime and save
an institution the time and money
required for more costly repairs — not
to mention the exponential benefit of
being able to mitigate any issues faster
from off-site.For example, an access
control system that incorporates
analytics may cause an alert if
someone accesses the building late at
night, but if the system administrator
can see that it’s a verified individual
and can manage that alarm remotely, it
eliminates the cost and hassle of an
on-site response or calling authorities
to investigate
further.CustomizationAccess control
features are not one-size-fits-all. A
government building will utilize one
feature set for access control, such as
FICAM-compliant solutions, while a
university campus may utilize another,
such as selecting different access
control permissions based on the time
of day. Many secure environments also
need a variety of choices for access
management, defining different
parameters for separate areas of their
facilities. The cloud gives users the
ability to choose the elements they
need to bring into their system,
creating a customized solution that
best fits their needs while maintaining
the flexibility to change those elements
over time.ScalabilityOne of the biggest
needs for flexibility is within the
ongoing growth and changes an
organization experiences. For
example, if a campus administrator
adds on a new building with 38 doors
that need to be secured, or decides to
renovate the wing of an existing facility
with drastically increased access
protocols, they will want to be able to
add these functions on to their existing
platform seamlessly. Cloud-based
access control grants organizations
this ease through the ability to
effortlessly change when needed.
Users can begin by defining their
current demands and leverage the
cloud to meet such needs, instead of
investing in high-expense servers and
technologies of traditional systems that
may become obsolete or need to be
expanded in the future at further
expense to the organization.
Security
When anything is added to the
network, the IT department must have
involvement. Convergence of IT and
physical security is an ongoing trend
that continues to transform the
traditional way that security is handled.
However, flexibility in a cloud-based
system is achieved when the IT
department can trust the solution. This
cuts down on the ongoing myth that
the cloud is not secure. With proper
protocols in place, such as built-in
encryption, the cloud can offer a
multitude of benefits for enhancing the
security of data being transmitted. With
this level of encryption in place paired
with robust data insight, IT directors
gain a clearer picture of the facility
they are protecting, better enabling
them to appropriately respond as
events occur.
Security is a fast-moving arena, with
new access control features developed
each year. A cloud-based system is
designed in such a way that it can
grow with end users and the industry
— providing valuable solutions now as
well as into the future.
IDENTIV EDITION |6
www.identiv.com
PROFILE
BEST PRACTICES FOR WORKING
FROM HOME, SECURELY
by Brooke Grigsby, Director of Marketing
Today, I start my third week of working
from home… with an overly full house.
And yes, I’m happy to clarify.
I’ve worked from home for the past 18
years and generally, enjoyed my quiet nontraditional
office setting. But now, my
husband is working remotely as well — and
he is taking up bandwidth in various ways
— and the kids are home from school. In
addition, we have homeschooling
requirements to meet. And it’s looking as
though this reality will continue for some
time.
Just like many, I am looking for ways to
stay sane and connected as much as
IDENTIV EDITION |7
possible. I’ve spent time over the past few
weeks talking with people about how to
stay productive and efficient in a time of
chaos, where and when to implement new
tools and strategies to stay connected and
focused on the tasks at hand.
There are challenges to embracing this
“new normal” and for many of us, we must
continue to push forward as though nothing
has changed. But let’s face it, working from
home is more complicated than merely
logging into Slack, Skype, GoToMeeting, or
Zoom.
It’s important to consider other processes
as well, such as what applications are most
secure to share corporate information and
data. And how can mission-critical
stakeholders, such as those considered
essential or in the government space,
maintain compliance with data security
regulations while being remote? There are
a lot of questions, but there are a wide
array of tools to ensure safety and security
while being out of the office.As always,
government recommendations can serve
as an excellent basis on which to base
your organizational recommendations. The
Office of Budget and Management issued a
memorandum (M-20-19) in response to the
national emergency for COVID-19. Overall,
it directs agencies to use the breadth of
available (continued on next page)
www.identiv.com
technology capabilities to fulfill service gaps
and deliver positive outcomes. Most of these
directives can be addressed through the use
of technology that is very much available (and
proven) in today’s market.
Facilitating productivity
When I mention mobile apps, I know visions of
Monument Valley and your banking app come
to mind, but mobile applications are also
hugely valuable in high-security environments
to streamline cybersecurity efforts and make
remote work more accessible. Advanced
mobile applications, designed for missioncritical
environments, provide users with the
ability to edit and sign PDF documents from
their iPhone, iPad, or Android phone or tablet,
using their CAC, PIV, or derived credential.
Additionally, users can access two-factor
websites; sign, encrypt and decrypt emails;
and view, edit and create calendar
events.Even so, though there is a wide variety
of solutions available that specialise in
providing secure access from anywhere, it is
important for users to remember that one size
does not fit all. Both native and third-party
tools for web access and email, the two most
common needs of an employee on their
mobile device, are either completely absent or
lack the features needed for enterprise
deployment. Luckily,
IDENTIV EDITION |8
as manufacturers have pivoted to focus on
product development as well as
cybersecurity, they have developed a series
of solutions to meet these challenges.
What that means is there is an entire suite of
applications that provide users with the ability
to use two-factor authentication to access
websites and to sign, encrypt and decrypt
email (S/MIME). Setting remote employees
up for success requires more than
downloading an app on a device. Employers
should vet all potential options to ensure they
are making selections with cybersecurity in
mind.With the increase in bring your own
device (BYOD) movements in just about
every organization, mobile apps that allow
users the ability to deliver and receive digital
information and access essential services
anytime, anywhere and on any device, are
critical to everyday operations. This level of
remote connectivity is vital to enabling users
to mobilise at a moment’s notice while
simultaneously retaining the ability to stay
connected and secure.
Managing physical access to facilities
When managing physical access to facilities,
agencies should prepare to accommodate
personnel who are issued a new credential or
that receive a certificate update during their
absence from federal facilities. Some
individuals might need to re-enroll in the
physical access control system (PACS) for
access to the facility.
With software integration and access to an
outside network, modern access control
solutions can offer remote PIV provisioning
through an authoritative data source.
Agencies can process mass re-enrollment
and updates remotely. This process
streamlines the provisioning of users across
an organization’s infrastructure and will make
it easier to re-enroll individuals once the
workforce returns to normal.Whether users
need to open an email or connect to the
internet, it is crucial to take into account
federal recommendations for maintaining
cybersecurity.
Luckily, we live in a world where technology
providers strive to anticipate the environment
our customers are facing, both in terms of
technical requirements and functional
capabilities.As COVID-19 continues to wage
chaos worldwide, I hope these tips and
solutions for staying safe, smart and secure
during this time are of help to you.
We’re all in this together and need to keep it
that way. Until then, I’ll see you online.
www.identiv.com
can include tracking where wheelchairs and
gurneys are stored on the campus or tagging
packages that are at high risk of theft, such as
medication like painkillers. These and other
customizable applications can be accomplished
by using RFID and NFC tags. The same
solutions can be used to monitor the location of
infants or patients at risk for wandering.
Smart card credentials and readers can handle
allowing or denying access, but they are even
more powerful and agile when paired with a
physical access management platform. These
platforms can track movements and easily
change parameters around access for certain
users or times of the day. The specific needs
for access points, which may change over time,
could impact the locking mechanism needed
for one doorway or another throughout a
hospital environment.
What healthcare facilities need
Healthcare facilities require as little down time
as possible at their entryways to secure areas.
When an access path is taken out of
commission, it ideally should be for as short a
time as possible. Integrators should consider
exploring wireless locks as one way to speed
up an install and cause less disruption for both
doctors and patients.
Wireless locks can be implemented into doors
easier and faster than their wired counterparts,
which expand the areas of interruption and
increase install times. Hospital employees need
to be allowed quick and easy access around a
hospital to best help their patients. Blocking or
eliminating the use of a doorway, which is
necessary for wired solutions that require the
installation of multiple different elements, could
impede many critical functions.
For example, patients might have their activity
or sleep upset, both of which are necessary
elements of recovery. A shorter installation time
with wireless locks means that work can be
more easily scheduled at a convenient time for
patients and doctors, which is a value
proposition that integrators who only offer wired
solutions cannot compete with.
Protecting data
Due to the nature of their work, healthcare
centres collect and maintain many types of
sensitive data. In the event of a breach,
patients’ sensitive information could be
maliciously accessed via a weak point in the
IDENTIV EDITION |11
network. Endpoint devices that access the
network should be cybersecure against
vulnerabilities.
When many systems are interconnected,
having proper cybersecurity protocols among
all devices is a necessary step to ensure that
all systems are running smoothly.
Using analytics
Security providers have, for years, been finding
new ways to utilize existing infrastructure, and
one consistent area of overlap is among video
systems, analytics and business intelligence.
Video analytics, when used alongside access
control, can provide valuable insight. Users in
healthcare are engaging with analytics to
improve consumer experiences and help to
more effectively provide patient service. For
example, when integrated with access control,
analytics can provide insight into busier times
of days, trends in patient needs and more in an
effort to better assist during peak periods.
Certain doorways, such as those housing highrisk
patients, have trigger points that let
administrators know of a variety of event types:
door holding, door forced, etc. Integrators who
opt to pair this with video analytics provide their
end users with the situational awareness
necessary to make an informed decision.
For example, if a provider does not close a
door after leaving a room, data gathered from
access control and analytics can alert staff, but
simply closing the door will fix the issue. On the
other hand, if a patient is actively trying to
escape their room, administrators can deploy
on-site staff to de-escalate the situation.
The goal within healthcare is very similar
across all applications: keeping the wrong
people out while letting the right people in.
Hospitals must be able to track and locate
critical equipment or resources while also
monitoring all the people entering secure areas
and their reasons for doing so. To be
successful, integrators must understand that
hospitals are unique environments dedicated to
openness, but also have many security
considerations. Integrators who have a solid
understanding of the ins and outs of will more
easily gain the trust of end users.
www.identiv.com
REOPEN
THE
WORLD
T O G E T H E R
WE CAN
REINVENT
THE IOT