05.08.2020 Views

Identiv 2020 (1)

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Remote Workers, Remote Security

Business leaders require the ability to

manage their operations from any

location. The option of remote

management is no longer a luxury; for

some businesses, it is a necessity. This

is a function that is easily provided

through cloud-based architectures.

Administrators that work remotely reap

benefits through the cloud, with the

ability to manage and alter the system

as needed through a web-based portal.

The cloud can offer peace of mind by

allowing security personnel to monitor

the system health and be informed of

any errors or problems while away from

the office. An issue that is detected

early can prevent downtime and save

an institution the time and money

required for more costly repairs — not

to mention the exponential benefit of

being able to mitigate any issues faster

from off-site.For example, an access

control system that incorporates

analytics may cause an alert if

someone accesses the building late at

night, but if the system administrator

can see that it’s a verified individual

and can manage that alarm remotely, it

eliminates the cost and hassle of an

on-site response or calling authorities

to investigate

further.CustomizationAccess control

features are not one-size-fits-all. A

government building will utilize one

feature set for access control, such as

FICAM-compliant solutions, while a

university campus may utilize another,

such as selecting different access

control permissions based on the time

of day. Many secure environments also

need a variety of choices for access

management, defining different

parameters for separate areas of their

facilities. The cloud gives users the

ability to choose the elements they

need to bring into their system,

creating a customized solution that

best fits their needs while maintaining

the flexibility to change those elements

over time.ScalabilityOne of the biggest

needs for flexibility is within the

ongoing growth and changes an

organization experiences. For

example, if a campus administrator

adds on a new building with 38 doors

that need to be secured, or decides to

renovate the wing of an existing facility

with drastically increased access

protocols, they will want to be able to

add these functions on to their existing

platform seamlessly. Cloud-based

access control grants organizations

this ease through the ability to

effortlessly change when needed.

Users can begin by defining their

current demands and leverage the

cloud to meet such needs, instead of

investing in high-expense servers and

technologies of traditional systems that

may become obsolete or need to be

expanded in the future at further

expense to the organization.

Security

When anything is added to the

network, the IT department must have

involvement. Convergence of IT and

physical security is an ongoing trend

that continues to transform the

traditional way that security is handled.

However, flexibility in a cloud-based

system is achieved when the IT

department can trust the solution. This

cuts down on the ongoing myth that

the cloud is not secure. With proper

protocols in place, such as built-in

encryption, the cloud can offer a

multitude of benefits for enhancing the

security of data being transmitted. With

this level of encryption in place paired

with robust data insight, IT directors

gain a clearer picture of the facility

they are protecting, better enabling

them to appropriately respond as

events occur.

Security is a fast-moving arena, with

new access control features developed

each year. A cloud-based system is

designed in such a way that it can

grow with end users and the industry

— providing valuable solutions now as

well as into the future.

IDENTIV EDITION |6

www.identiv.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!