Identiv 2020 (1)


Q3 2020



Smart Security,

Smarter World

Learn how Identiv is helping organizations

around the world get back to work


Learn how you

can use

access control

to contact


In This Together

Top tips and solutions for staying safe, smart, and

secure during this time of transition.




As we navigate these unprecedented times, Identiv is deeply focused on the

health, safety, and well-being of our team, partners, and customers. None of us

knows exactly the extent or duration of what lies ahead. For all of us, this is a time

of concern for our employees, our friends, and our families, and uncertainty

around the economic impacts on our partners and customers.

While doing everything possible to protect everyone’s health and safety, we’re

also committed to supporting our partners and customers. We’ve implemented

business continuity plans to ensure we’re providing service in every way possible.

We’re leveraging our global locations and supply chain to continue supplying our

mission-critical security and transponder solutions to government and commercial

customers. We’re also using this time to keep in touch and ask how we can help;

we’re still hard at work guiding our business and product direction. It’s not

business as usual — it’s doing everything we can, with you, to ensure we ALL

bounce back stronger, regardless of how long the health and economic impact of

this virus lasts.

As the situation continues to develop, we plan to remain fluid and support those

that are most affected. We’re all in this together.

We wish you, your families, and your communities good health.


CEO, Identiv







As businesses open up and people around the

world return to work, it’s critical to have processes

and solutions in place that keep employees and

visitors feeling safe, comfortable, and confident.

With the threat of COVID-19 still

genuine, frictionless, hands-free

solutions are a crucial part of any

organization’s efforts to create a

healthier, more hygienic environment.

But what exactly is frictionless access

control? Frictionless access control is

a way to permit access to an area

without interfering with the user’s

experience. In essence, the goal is to

make the entire process easier.

Employees no longer have to carry a

badge or search through their

belongings to present credentials to a


A well-designed access control

system should allow people to go

about their daily lives freely, but still

provide peace of mind when it comes

to security needs. Regardless of the

ease of a platform, it needs to deliver

an adequate level of protection to

eliminate unauthorized access.

Mobile Apps as Credentials

Mobile applications leverage

Bluetooth and capacitive technologies

to allow for complete frictionless

access. Loaded on to a user’s smart

device, the mobile application acts as

a physical credential. An employee

can keep their mobile device in their

pocket, then wave their hand near the

reader, and the door unlocks. Since

most of us are glued to our mobile

phones, organizations can expect to

see a sharp decline in those who

forget their credential at home.Some

advanced systems have hit the

market that don’t require a reader at

the door.

The software-based architecture uses

the mobile device’s location to

determine a person’s proximity to the

door for hands-free ingress and

egress. How’s that for a “clean”

access control authorization process.

No-Touch Attendance

Frequent touchpoints, like punch

clocks, can easily be replaced by

contactless technology. Smart card

readers with multiple frequency

options and a keyboard emulation are

perfect for employers who use a

mixture of techniques for logical

access. Integrating easily with most

time and attendance systems,

employees tap the card to the reader

to clock in for the day. This process

simplifies the user experience and

also makes it easier for employees to

focus on the day at hand.

Look, Ma! Nearly Hands-Free!

Near-field communication (NFC) and

125 kHz low-frequency (LF) proximity

technology have something in

common: you can use them to get

near an access point without ever

touching it. These types of

transponders create a contactless

transaction and connect electronic

devices with a simple tap-and-go

model.Are you tired of reaching for

your phone or card every time you

need to gain access to a parking

garage, building, room, or elevator?

Well, we’re here to save the day. A

wearable passive radio frequency

identification (RFID) device can be

used instead (and since it’s

impervious to moisture, it can be

especially helpful during those 20





MobilisID: a smart frictionless

access control, no touching


uTrust 3721: Out-of-the-box,

this smart card reader can

integrate with most time and

attendance systems.

uTrust Proximity Wristbands:

Our wearable wristband keeps

access where you need it.

Hirsch Velocity Software with

Contact Tracing can pull a

report of everyone who

entered the same door who

can then be notified to either

get tested or self-quarantine.

second hand washings).

When choosing to invest in any type

of frictionless access control, it is vital

to keep in mind that the system needs

to adhere to your internal

requirements and must have room to

grow over time.

We don’t fully know how the pandemic

will reshape the workplace, but we do

know it is accelerating digital

transformation. Overall, frictionless

access control will continue to see

increased demand even after the

pandemic, as more organizations

move away from older technologies

and make way for more secure


Remote Workers, Remote Security

Business leaders require the ability to

manage their operations from any

location. The option of remote

management is no longer a luxury; for

some businesses, it is a necessity. This

is a function that is easily provided

through cloud-based architectures.

Administrators that work remotely reap

benefits through the cloud, with the

ability to manage and alter the system

as needed through a web-based portal.

The cloud can offer peace of mind by

allowing security personnel to monitor

the system health and be informed of

any errors or problems while away from

the office. An issue that is detected

early can prevent downtime and save

an institution the time and money

required for more costly repairs — not

to mention the exponential benefit of

being able to mitigate any issues faster

from off-site.For example, an access

control system that incorporates

analytics may cause an alert if

someone accesses the building late at

night, but if the system administrator

can see that it’s a verified individual

and can manage that alarm remotely, it

eliminates the cost and hassle of an

on-site response or calling authorities

to investigate

further.CustomizationAccess control

features are not one-size-fits-all. A

government building will utilize one

feature set for access control, such as

FICAM-compliant solutions, while a

university campus may utilize another,

such as selecting different access

control permissions based on the time

of day. Many secure environments also

need a variety of choices for access

management, defining different

parameters for separate areas of their

facilities. The cloud gives users the

ability to choose the elements they

need to bring into their system,

creating a customized solution that

best fits their needs while maintaining

the flexibility to change those elements

over time.ScalabilityOne of the biggest

needs for flexibility is within the

ongoing growth and changes an

organization experiences. For

example, if a campus administrator

adds on a new building with 38 doors

that need to be secured, or decides to

renovate the wing of an existing facility

with drastically increased access

protocols, they will want to be able to

add these functions on to their existing

platform seamlessly. Cloud-based

access control grants organizations

this ease through the ability to

effortlessly change when needed.

Users can begin by defining their

current demands and leverage the

cloud to meet such needs, instead of

investing in high-expense servers and

technologies of traditional systems that

may become obsolete or need to be

expanded in the future at further

expense to the organization.


When anything is added to the

network, the IT department must have

involvement. Convergence of IT and

physical security is an ongoing trend

that continues to transform the

traditional way that security is handled.

However, flexibility in a cloud-based

system is achieved when the IT

department can trust the solution. This

cuts down on the ongoing myth that

the cloud is not secure. With proper

protocols in place, such as built-in

encryption, the cloud can offer a

multitude of benefits for enhancing the

security of data being transmitted. With

this level of encryption in place paired

with robust data insight, IT directors

gain a clearer picture of the facility

they are protecting, better enabling

them to appropriately respond as

events occur.

Security is a fast-moving arena, with

new access control features developed

each year. A cloud-based system is

designed in such a way that it can

grow with end users and the industry

— providing valuable solutions now as

well as into the future.





by Brooke Grigsby, Director of Marketing

Today, I start my third week of working

from home… with an overly full house.

And yes, I’m happy to clarify.

I’ve worked from home for the past 18

years and generally, enjoyed my quiet nontraditional

office setting. But now, my

husband is working remotely as well — and

he is taking up bandwidth in various ways

— and the kids are home from school. In

addition, we have homeschooling

requirements to meet. And it’s looking as

though this reality will continue for some


Just like many, I am looking for ways to

stay sane and connected as much as


possible. I’ve spent time over the past few

weeks talking with people about how to

stay productive and efficient in a time of

chaos, where and when to implement new

tools and strategies to stay connected and

focused on the tasks at hand.

There are challenges to embracing this

“new normal” and for many of us, we must

continue to push forward as though nothing

has changed. But let’s face it, working from

home is more complicated than merely

logging into Slack, Skype, GoToMeeting, or


It’s important to consider other processes

as well, such as what applications are most

secure to share corporate information and

data. And how can mission-critical

stakeholders, such as those considered

essential or in the government space,

maintain compliance with data security

regulations while being remote? There are

a lot of questions, but there are a wide

array of tools to ensure safety and security

while being out of the office.As always,

government recommendations can serve

as an excellent basis on which to base

your organizational recommendations. The

Office of Budget and Management issued a

memorandum (M-20-19) in response to the

national emergency for COVID-19. Overall,

it directs agencies to use the breadth of

available (continued on next page)

technology capabilities to fulfill service gaps

and deliver positive outcomes. Most of these

directives can be addressed through the use

of technology that is very much available (and

proven) in today’s market.

Facilitating productivity

When I mention mobile apps, I know visions of

Monument Valley and your banking app come

to mind, but mobile applications are also

hugely valuable in high-security environments

to streamline cybersecurity efforts and make

remote work more accessible. Advanced

mobile applications, designed for missioncritical

environments, provide users with the

ability to edit and sign PDF documents from

their iPhone, iPad, or Android phone or tablet,

using their CAC, PIV, or derived credential.

Additionally, users can access two-factor

websites; sign, encrypt and decrypt emails;

and view, edit and create calendar

events.Even so, though there is a wide variety

of solutions available that specialise in

providing secure access from anywhere, it is

important for users to remember that one size

does not fit all. Both native and third-party

tools for web access and email, the two most

common needs of an employee on their

mobile device, are either completely absent or

lack the features needed for enterprise

deployment. Luckily,


as manufacturers have pivoted to focus on

product development as well as

cybersecurity, they have developed a series

of solutions to meet these challenges.

What that means is there is an entire suite of

applications that provide users with the ability

to use two-factor authentication to access

websites and to sign, encrypt and decrypt

email (S/MIME). Setting remote employees

up for success requires more than

downloading an app on a device. Employers

should vet all potential options to ensure they

are making selections with cybersecurity in

mind.With the increase in bring your own

device (BYOD) movements in just about

every organization, mobile apps that allow

users the ability to deliver and receive digital

information and access essential services

anytime, anywhere and on any device, are

critical to everyday operations. This level of

remote connectivity is vital to enabling users

to mobilise at a moment’s notice while

simultaneously retaining the ability to stay

connected and secure.

Managing physical access to facilities

When managing physical access to facilities,

agencies should prepare to accommodate

personnel who are issued a new credential or

that receive a certificate update during their

absence from federal facilities. Some

individuals might need to re-enroll in the

physical access control system (PACS) for

access to the facility.

With software integration and access to an

outside network, modern access control

solutions can offer remote PIV provisioning

through an authoritative data source.

Agencies can process mass re-enrollment

and updates remotely. This process

streamlines the provisioning of users across

an organization’s infrastructure and will make

it easier to re-enroll individuals once the

workforce returns to normal.Whether users

need to open an email or connect to the

internet, it is crucial to take into account

federal recommendations for maintaining


Luckily, we live in a world where technology

providers strive to anticipate the environment

our customers are facing, both in terms of

technical requirements and functional

capabilities.As COVID-19 continues to wage

chaos worldwide, I hope these tips and

solutions for staying safe, smart and secure

during this time are of help to you.

We’re all in this together and need to keep it

that way. Until then, I’ll see you online.

can include tracking where wheelchairs and

gurneys are stored on the campus or tagging

packages that are at high risk of theft, such as

medication like painkillers. These and other

customizable applications can be accomplished

by using RFID and NFC tags. The same

solutions can be used to monitor the location of

infants or patients at risk for wandering.

Smart card credentials and readers can handle

allowing or denying access, but they are even

more powerful and agile when paired with a

physical access management platform. These

platforms can track movements and easily

change parameters around access for certain

users or times of the day. The specific needs

for access points, which may change over time,

could impact the locking mechanism needed

for one doorway or another throughout a

hospital environment.

What healthcare facilities need

Healthcare facilities require as little down time

as possible at their entryways to secure areas.

When an access path is taken out of

commission, it ideally should be for as short a

time as possible. Integrators should consider

exploring wireless locks as one way to speed

up an install and cause less disruption for both

doctors and patients.

Wireless locks can be implemented into doors

easier and faster than their wired counterparts,

which expand the areas of interruption and

increase install times. Hospital employees need

to be allowed quick and easy access around a

hospital to best help their patients. Blocking or

eliminating the use of a doorway, which is

necessary for wired solutions that require the

installation of multiple different elements, could

impede many critical functions.

For example, patients might have their activity

or sleep upset, both of which are necessary

elements of recovery. A shorter installation time

with wireless locks means that work can be

more easily scheduled at a convenient time for

patients and doctors, which is a value

proposition that integrators who only offer wired

solutions cannot compete with.

Protecting data

Due to the nature of their work, healthcare

centres collect and maintain many types of

sensitive data. In the event of a breach,

patients’ sensitive information could be

maliciously accessed via a weak point in the


network. Endpoint devices that access the

network should be cybersecure against


When many systems are interconnected,

having proper cybersecurity protocols among

all devices is a necessary step to ensure that

all systems are running smoothly.

Using analytics

Security providers have, for years, been finding

new ways to utilize existing infrastructure, and

one consistent area of overlap is among video

systems, analytics and business intelligence.

Video analytics, when used alongside access

control, can provide valuable insight. Users in

healthcare are engaging with analytics to

improve consumer experiences and help to

more effectively provide patient service. For

example, when integrated with access control,

analytics can provide insight into busier times

of days, trends in patient needs and more in an

effort to better assist during peak periods.

Certain doorways, such as those housing highrisk

patients, have trigger points that let

administrators know of a variety of event types:

door holding, door forced, etc. Integrators who

opt to pair this with video analytics provide their

end users with the situational awareness

necessary to make an informed decision.

For example, if a provider does not close a

door after leaving a room, data gathered from

access control and analytics can alert staff, but

simply closing the door will fix the issue. On the

other hand, if a patient is actively trying to

escape their room, administrators can deploy

on-site staff to de-escalate the situation.

The goal within healthcare is very similar

across all applications: keeping the wrong

people out while letting the right people in.

Hospitals must be able to track and locate

critical equipment or resources while also

monitoring all the people entering secure areas

and their reasons for doing so. To be

successful, integrators must understand that

hospitals are unique environments dedicated to

openness, but also have many security

considerations. Integrators who have a solid

understanding of the ins and outs of will more

easily gain the trust of end users.








Similar magazines