Identiv 2020 (1)
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Remote Workers, Remote Security
Business leaders require the ability to
manage their operations from any
location. The option of remote
management is no longer a luxury; for
some businesses, it is a necessity. This
is a function that is easily provided
through cloud-based architectures.
Administrators that work remotely reap
benefits through the cloud, with the
ability to manage and alter the system
as needed through a web-based portal.
The cloud can offer peace of mind by
allowing security personnel to monitor
the system health and be informed of
any errors or problems while away from
the office. An issue that is detected
early can prevent downtime and save
an institution the time and money
required for more costly repairs — not
to mention the exponential benefit of
being able to mitigate any issues faster
from off-site.For example, an access
control system that incorporates
analytics may cause an alert if
someone accesses the building late at
night, but if the system administrator
can see that it’s a verified individual
and can manage that alarm remotely, it
eliminates the cost and hassle of an
on-site response or calling authorities
to investigate
further.CustomizationAccess control
features are not one-size-fits-all. A
government building will utilize one
feature set for access control, such as
FICAM-compliant solutions, while a
university campus may utilize another,
such as selecting different access
control permissions based on the time
of day. Many secure environments also
need a variety of choices for access
management, defining different
parameters for separate areas of their
facilities. The cloud gives users the
ability to choose the elements they
need to bring into their system,
creating a customized solution that
best fits their needs while maintaining
the flexibility to change those elements
over time.ScalabilityOne of the biggest
needs for flexibility is within the
ongoing growth and changes an
organization experiences. For
example, if a campus administrator
adds on a new building with 38 doors
that need to be secured, or decides to
renovate the wing of an existing facility
with drastically increased access
protocols, they will want to be able to
add these functions on to their existing
platform seamlessly. Cloud-based
access control grants organizations
this ease through the ability to
effortlessly change when needed.
Users can begin by defining their
current demands and leverage the
cloud to meet such needs, instead of
investing in high-expense servers and
technologies of traditional systems that
may become obsolete or need to be
expanded in the future at further
expense to the organization.
Security
When anything is added to the
network, the IT department must have
involvement. Convergence of IT and
physical security is an ongoing trend
that continues to transform the
traditional way that security is handled.
However, flexibility in a cloud-based
system is achieved when the IT
department can trust the solution. This
cuts down on the ongoing myth that
the cloud is not secure. With proper
protocols in place, such as built-in
encryption, the cloud can offer a
multitude of benefits for enhancing the
security of data being transmitted. With
this level of encryption in place paired
with robust data insight, IT directors
gain a clearer picture of the facility
they are protecting, better enabling
them to appropriately respond as
events occur.
Security is a fast-moving arena, with
new access control features developed
each year. A cloud-based system is
designed in such a way that it can
grow with end users and the industry
— providing valuable solutions now as
well as into the future.
IDENTIV EDITION |6
www.identiv.com