Access control accessories - Expert commentary

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Q&A: Bosch Video Systems & Solutions' Michael Seiter And Magnus Ekerot On Smart Technology, "AIot", And Plans For 2021
Q&A: Bosch Video Systems & Solutions' Michael Seiter And Magnus Ekerot On Smart Technology, "AIot", And Plans For 2021

Q: Mr. Seiter, Mr. Ekerot, you both joined Bosch Building Technologies’ business unit Video Systems & Solutions as Senior Vice Presidents in March 2020, when the Coronavirus pandemic was just beginning. How did your business unit get through 2020? Magnus Ekerot: The crisis was also felt at Bosch. At the same time, demand has risen for solutions that keep businesses open and protect people's health. We offer corresponding video solutions that can make a significant contribution to containing the pandemic.  Michael Seiter: Overall, we managed the past year well despite the challenges and have been growing again since the third quarter compared to 2019. We see good opportunities for further growth in 2021. Q: Has the Corona crisis again accelerated the development of smart technologies in the security technology market, and does the security market in contrast to most industries benefit from the crisis more than it suffers? Michael Seiter: The Corona crisis has definitely demonstrated that the future lies in data-driven solutions. Thanks to our product development strategy already being based on this, we at Bosch were very quickly able to develop new products for the ‘New Normal’ and to expand existing products accordingly. To give one or two examples: in cooperation with Philips, we very quickly developed a people counting solution for retail operations – smart Philips displays in conjunction with smart cameras from Bosch that provide protection for staff and customers. The In-Store Analytics software solution was also implemented with additional features. Shop owners can now make decisions based on customer movement data such as “Where do we position products to avoid queues or crowds?” HTD involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature  The latest highlight is the Bosch Human Skin Temperature Detection solution, in short HTD. This involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature at control points in offices, factory floors, or airports. The benefits of previously existing solutions on the market are sometimes called into question. Competitors are often unable to deliver what they promise because, for example, the measured temperature of the skin does not correspond to the core temperature of the person, or fluctuates, due to environmental influences. Therefore, we developed a software-based solution that, in compliance with GDPR, first allows people with potentially elevated body temperatures to be filtered out, and in a second step, allows medical personnel to perform a more targeted fever measurement. Q: You see a lot of potential for the video security industry in new technologies such as Artificial Intelligence and the Internet of Things. What specific opportunities do you mean, and how are you leveraging these technologies at Bosch Building Technologies? Michael Seiter: Bosch has committed itself fully to an “AIoT” – AI meets IoT – strategy. The development of AI algorithms and software, in general, is at Bosch significantly driven in the security space.  By AIoT, we specifically mean the networking of physical products and the deployment of artificial intelligence. With AI we aim to enable clients to understand events at an ever-deeper level and predict them in the future – the keyword being predictive – so that they can act proactively. This is particularly important for health and safety. An example is the Intelligent Insights solution where the user can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area. Q: From your point of view do you have an advantage over other suppliers when it comes to AI-based products in the video arena? Michael Seiter: The analysis and utilization of video data have long been front and center with us. Since 2016 we’ve been following the strategy of offering AI applications in the form of integrated intelligent video analytics as a standard in our network cameras. Data such as color, object size, object speed, and direction are all measured. Simply put, you can say this is seeing and understanding – which is the principle behind smart security cameras. Today it’s much more a question of intelligent, data-based solutions than collecting high-quality pictures and storing them for the record. Bosch has been investing heavily in AI for years, from which we can benefit greatly in our area. In the first quarter, for example, we will launch a vehicle detector based on deep learning that is already running on our cameras. This will create significant added value for our customers in the area of intelligent traffic control. Q: Mr. Ekerot, what advantages do customers have in AI-based video security from Bosch? Magnus Ekerot: A key advantage is strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms A key advantage is our strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms. Take the example of Camera Trainer, a machine learning software that can be directly uploaded to Bosch network cameras. The camera is thus trained up on recognizing objects and situations – tailored to the specific needs of our customers. If the camera detects the defined scenario, it performs a predefined action in real-time – for example, a count or an alarm. The latest example is our new camera platform Inteox. As a completely open camera platform, Inteox combines Bosch's intelligent video analytics with an open operating system. This allows programmers to develop specific software applications - or apps - for various application purposes. These can then be loaded onto cameras – the same principle as an app store for smartphones. To sum up, Bosch AI applications support customer-specific needs related to data analysis while enabling totally new applications within and beyond the video security market. Q: Can you name a specific current project where Bosch has deployed an AI-based solution? Magnus Ekerot: A current ground-breaking project using our smart cameras is being implemented as a pilot in the USA. Smart Ohio enables users to configure more intelligent traffic flows and thus ensure mobility, safety, and the efficient use of roads today and tomorrow. The new vehicle detector mentioned by Mr. Seiter also plays a central role here. Our overall goal is to provide connected smart sensor solutions for public and private transportation agencies to enable them to operate their roads safely and efficiently. The Intelligent Insights can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area Q: Mr. Seiter, you have been involved with the topic of mobility for some time. What experience from your previous job in the automotive business of Bosch might help you when it comes to further develop the video portfolio of Bosch Building Technologies? Michael Seiter: There's a lot to tell. First of all, the development of core algorithms for video-based solutions, whether for autonomous driving, for vehicle interior monitoring, or for our Bosch Building Technologies video systems, all come together at Bosch's Hildesheim location. This gives us considerable synergies and allows us to bring R&D results to market faster and more flexibly. Essentially, assisted driving systems use AI algorithms that process ever-increasing volumes of video data. Attempts are being made to imitate the human being and enable the vehicle to understand better the surrounding environment with its ‘eyes’. This predictive capability is especially critical with autonomous driving. For example, key questions include: “How should the car respond and what could potentially happen next?” “What kind of environment does it find itself in?” etc. There are many activities in this area at Bosch that in my new role in security we can also strongly benefit from. I am now bringing a lot of this experience and existing R&D achievements to Bosch Video Systems & Solutions, which also results in further synergies with our mobility division: At Stuttgart Airport, autonomous driving is already being implemented together with Mercedes-Benz and the parking garage operator Apcoa as part of the "Automated Valet Parking" project, or AVP for short, in which intelligent video systems from Bosch Building Technologies are making a significant contribution. Mr. Ekerot, you have a lot of experience in the video security area. Where do you position Bosch Building Technologies now in this market and what specific goals are you pursuing? Magnus Ekerot: Our clients are looking for reliable partners and products. We are a strong brand; you can rely on Bosch products. Bosch is a thought leader in video and a pioneer in AI applications in this field since 2016. Data security is everything to us: Our products conform to the EU’s GDPR regulations. Beyond that, we have an extensive camera portfolio that complies with the US National Defense Authorization Act (NDAA) for video security devices. This enables our portfolio to be deployed for example within US government buildings. We are planning to conclude more software maintenance agreements with our clients in 2021. These deliver investment and future security for our customers and include for example a ‘patch guarantee’ along with regular updates with new functionalities. This is the first step in a comprehensive plan to access new revenue channels for us and our partners delivering the best technology and excellent service to the end-user! Overall, many new products will be launched this year and this trend will intensify. Our goal is to establish new product families that follow a simple principle: “The development and delivery of disruptive, predictive video solutions that every user can trust because of the underlying sustainable forward-thinking mindset.” It’s been much discussed of late that Bosch is one of the very first companies globally that operates on a CO2-neutral basis. How does sustainability impact your business? Magnus Ekerot: IoT solutions are actually sustainable and contribute to environmental protection Our IoT solutions are actually sustainable and contribute to environmental protection. For example, our cameras are sustainable in that they remain up-to-date through software updates and needn’t be constantly exchanged for new ones. Our systems demonstrate sustainability also operationally as they can be managed remotely. System integrators don’t need to be physically present, thus avoiding unnecessary travel with its accompanying emissions. All in all, Bosch Building Technologies develops ways to accompany and support our clients in reaching their climate goals via new technologies. This can be done, for example, through improved energy efficiency, the total cost of ownership models, organizing and simplifying the supply chain, and helping our customers meet their social responsibilities. The Power of Bosch helps us here to leverage company-wide research to be two steps ahead, a shade faster, when it comes to new technologies and initiatives that our and future generations will benefit from. I should also say that I am personally very proud to work for a company that set an ambitious climate goal for itself and achieved it! Can you already share a preview of your technology innovations in 2021? Michael Seiter: We see great market potential for our cameras that use artificial intelligence and can be updated flexibly throughout their lifecycles. I have already mentioned the deep learning-based vehicle detector in our cameras. More such solutions – also for other applications where object and person recognition are important – will follow in the course of the year. And the best part is: with AI, the more data we collect and the more intelligently we use it, the better the solutions become and the more added value they bring to the customer. This will revolutionize our industry! Another example is our cloud-based solutions, for example for alarm monitoring. Here, we can now also integrate third-party cameras and, building on this, offer and jointly develop our intelligent software-based solutions. This gives our customers more opportunities to take advantage of the opportunities created by AI. The trend towards integration of the various security technologies seems to be driven mostly by the rapid progress in software development. Does this affect full-range suppliers such as Bosch and what specific plans for fully integrated security solutions do you have for the future? Michael Seiter: Naturally, this suits us as a full-scope supplier. Bosch solutions are deployed in many cross-domain client projects. We have experts for the different domains under one roof and a strong brand with the same quality promise for all areas. Nevertheless, it is always also about specific domain excellence. Only when you master all different areas and have profound and proven expertise in each of them you can succeed in integrated cross-domain projects. The respective business units craft their future strategies and innovation roadmaps with this in mind – as we do in the field of Video Systems & Solutions. Our business unit offers fully integrated Bosch video solutions that can be extended and operated on open systems. This is why we drive open platforms such as Inteox, to offer customers from a wide range of industries the right solutions. Our Bosch Integration Partner Program that we launched in 2012 is also heading in this direction – every product can be integrated into multiple other systems and VMS solutions. In summary: At Bosch, we are both a one-stop-shop, but also an open-system, meaning we offer customers maximum flexibility in their choice of products and services.

Surveillance In 2017: 360-degree Cameras  A Primary Device For Total Situational Awareness
Surveillance In 2017: 360-degree Cameras A Primary Device For Total Situational Awareness

The physical security market continues to experience growth as users look to capitalize on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree cameras exclusively to provide extensive coverage inside a facility or in a large outdoor area, with traditional narrow field-of-view cameras used only at “choke” points. Increase In Cybersecurity Threats And Breaches At the end of 2016, we predicted a major trend this year would be an increase in cybersecurity concerns for users of physical security systems, and we were right. An increase in cybersecurity threats and breaches have put organizations on watch. Based on this and the adoption of more IT-centric infrastructure and protocols, there is significant collaboration between IT and physical security, and true “convergence” is finally starting to happen. The adoption of video analytics also continued to increase this year, as most video surveillance projects involved the use of some form of analytics and data analysis. Demand For Safeguards As we move into 2018, the trends of 2017 will roll over, and cybersecurity will continue to be a major issue. Suppliers of hardware and software will put an even greater emphasis being cyber secure and end users will increasingly demand safeguards. Additionally, the deployment and use of advanced analytics based on newer artificial intelligence-based technologies will continue to increase. It will be the technology providers that find ways to allow users to capture additional value from the information collected by security systems that will accelerate growth. Oncam made significant investments in new products that leverage analytics and cloud technologies. In 2018, we will continue to invest in the development of new products, with a focus on solutions for particular applications across industry segments. Beyond our technology advancements, we've invested significantly in boosting our sales force in the Americas and adding industry experts to ensure sustained customer and partner success with our solutions. From our vantage point, Oncam is well positioned to capitalize on opportunities for growth in the coming year.

Latest Hirsch / IDENTIVE news

Identiv’s COVID-19 Response Solutions Support Enterprises And Government Customers In Reopening Of Global Offices
Identiv’s COVID-19 Response Solutions Support Enterprises And Government Customers In Reopening Of Global Offices

Identiv, Inc. has announced its cohesive collection of COVID-19 response solutions in order to support enterprises and government customers in worldwide offices that are now reopening. Identiv’s frictionless, touchless solutions create healthier and more hygienic offices. The hands-free technology also streamlines transactions and access, temperature tracking, and contact tracing to help employees and visitors feel safe and secure. Frictionless, hands-free technology “With the threat of COVID-19 still around us, frictionless, hands-free solutions are a key part of any organization’s efforts to make a healthier, safer environment,” said Steven Humphreys, Identiv Chief Executive Officer (CEO). Identiv’s highly secure access and identity solutions address multiple business needs to re-open and grow" Steven adds, “Identiv’s highly secure access and identity solutions address multiple needs for businesses to re-open and grow again in the new pandemic-era normal.” Quick, affordable temperature tracking “As large public venues begin to reopen, quick, affordable temperature tracking will be the first line of defense to assure visitors and employees that operators have their safety at top of mind,” added Dr. Manfred Mueller, Identiv Chief Operations Officer (COO) and General Manager, Identity. Dr. Mueller adds, “For those not yet comfortable returning to work, secure network log-in options facilitate a bridge between on-site and telecommuting teams.” Identiv’s complete portfolio of COVID-19 response solutions include: Smart, frictionless access control MobilisID uses the latest in Bluetooth and capacitive technologies to allow complete frictionless access, no touching required. The MobilisID App (available via Apple iOS and Android) acts as a physical credential — the user can keep their mobile device in their pocket, wave their hand near the MobilisID Reader and the door automatically unlocks. MobilisID can also integrate with ADA-compliant automatic door hardware to form a complete touchless solution. With the Freedom access control system, no reader is even required at the door. Freedom’s software-defined architecture uses the location of a user’s mobile device to determine their proximity to a door for hands-free ingress and egress. The system can also be used in parallel with conventional reader doors. Frictionless, battery-less uTrust UHF Credentials work with identification applications that require long-distance reading (i.e., more than 18 - 21 feet). Ultra high-frequency (UHF) technology is ideal for parking lot access and gate control, door entry in hospitals or gated communities, logistics, object and people tracking in emergency situations, real-time locationing, cafeteria access, and any hands-free environment, including medical or care facilities, club and resort membership, sport facilities, and universities. The credentials can be read through badge holders, handbags, pockets, and  No-touch time and attendance uTrust 3721 F multi-technology smart card reader features multiple frequency options and a keyboard emulation. Perfect for employers who use a mixture of technologies for logical access, uTrust 3721 F leverages existing 125 kHz low-frequency (LF) or 13.56 MHz high-frequency (HF) cards. Out-of-the-box, uTrust 3721 F can work with most time and attendance systems, letting employees simply tap a card to the reader to clock in.  Nearly hands-free transactions and access With Near Field Communication (NFC) technology, it’s easy to get near an access point without ever actually touching it. Identiv’s NFC-enabled solutions feature a catalog of transponders compatible with NFC Forum created for secure contactless transactions and connecting electronic devices with a simple tap-and-go model. Designed for comfort and wearability, the uTrust Proximity Wristband keeps wearers from reaching for their phone or card every time they need to gain access to a parking garage, building, room, or elevator. A passive radio frequency identification (RFID) device, the no-battery credential is robust, resistant to cracking, and impervious to moisture.  Temperature tracking and contact tracing Identiv’s Body Temperature Measurement Patch is a wearable NFC-enabled transponder that supports the reopening of public spaces worldwide, including theme parks and stadiums, and helps operators keep attendees and employees comfortable, confident, and safe. The patch also supports global governments and healthcare workers that need to periodically monitor quarantined patients diagnosed with COVID-19. The new solution combines the simplicity of using NFC and the smart technology potential of the Internet of Things (IoT), making body temperature monitoring easier than ever. Identiv has partnered with Telaeris to deliver a rapidly deployable, industry-renowned, mobile access control hardware and software solution that provides security in a variety of mission-critical situations where traditional systems cannot be supported. By leveraging Telaeris’ mobile credential verification hardware, Hirsch Velocity Software-based access control systems can go beyond protecting the perimeter and empower security staff to authenticate and authorize users with photos from anywhere, at any time, with real-time server synchronization. Telaeris handheld units with HealthCheck functionality can prompt staff to ask a series of health questions and input the taken temperature of a validated user to create a ‘health/access check’ profile upon entering which can then be repeated upon exiting. If a person enters a building and is later found to be symptomatic, Hirsch Velocity Software with Contact Tracing can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. While this is useful during the days of COVID-19, it can also be used for other applications, such as the seasonal influenza. This means every office can be proactive in responding to potential outbreaks, while simultaneously providing employees with the peace of mind that there are measures in place to keep them safe.  Working from Home For some organizations, even as worldwide economies are restarting, employees continue to or are more comfortable working from home. Identiv’s smart card reader portfolio keeps work flowing while ensuring everyone’s data and health stays safe and secure. Top selections for secure network log-in while telecommuting include, uTrust Token Pro Mini Type A (smallest form factor, strong PKI, and Java Card technology, uTrust Token Pro Mini Type C (USB C and can feature user branding and applets), uTrust 2700R Contact (supports all PC operating systems and cards ICs), 0 USB (ultra-compact, CAC and PIV-approved, and available in USB C, uTrust 4701 F Dual Interface (combines contact, contactless, and NFC tech), and uTrust SmartFold SCR3500 A (USB A, ultra-compact, and CAC and PIV-approved). As the economy begins to open up and people around the world return to work, it’s critical to have solutions in place that keep employees and visitors feeling safe, comfortable, and confident.

Identiv’s Hirsch Velocity Access Control Platform Now Enables Contact Tracing For Hirsch Customers
Identiv’s Hirsch Velocity Access Control Platform Now Enables Contact Tracing For Hirsch Customers

Identiv, Inc. announced the availability of Hirsch Velocity Software with Contact Tracing. Available via download for Hirsch customers, the free feature has been launched to support worldwide office re-openings with improved health and safety management tools. Based on the Centers for Disease Control and Preventions’ (CDC) recommendations, contract tracing is a key strategy for preventing further spread of the novel coronavirus (COVID-19).  Hirsch Velocity Software with Contact Tracing is a means of proactively and reactively protecting visitors. If a person enters a building and is later found to be symptomatic of an illness, Velocity can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. The feature is free, easy to download, and simple to implement into existing Velocity physical access control system (PACS) platforms.  Manage access control While this is useful during the days of COVID-19, it can also be used for other applications, such as seasonal influenza" “While this is useful during the days of COVID-19, it can also be used for other applications, such as seasonal influenza,” said Mark Allen, Identiv GM, Premises. “This means your office can be proactive in responding to potential outbreaks, while simultaneously providing your employees with the peace of mind that there are measures in place to keep them safe.” Hirsch Velocity Software provides the security and functionality expected from high-end systems with the ease-of-use found in entry-level packages. Velocity is an integrated platform that manages access control and security operations in thousands of different facilities, from single high secure rooms to multi-building, multi-location campuses with the most stringent security compliance. Prevent unwanted access With Velocity, users can control doors, gates, turnstiles, elevators, and other equipment, monitor employees and visitor behavior, prevent unwanted access, maintain compliance, and provide a robust audit trail. The latest version of the software platform is designed to deliver the highest level of security, interoperability, and backwards compatibility, and it accommodates the evolution of security technology.

Identiv's Hirsch Velocity Physical Access Control Solution Approved By The UK Center For The Protection Of National Infrastructure
Identiv's Hirsch Velocity Physical Access Control Solution Approved By The UK Center For The Protection Of National Infrastructure

Identiv, Inc. has announced that after extensive testing of its Hirsch Physical Access Control System (PACS) CPNI solution, the platform is now approved by the Center for the Protection of National Infrastructure (CPNI), the UK government authority for protective security advice to the country’s national infrastructure. CPNI-approved physical access control platform The CPNI works with partners in government, police, industry, and academia to protect the nation from threats and terrorism, only recommending physical security equipment that meets its stringent certification requirements.  “UK sites classified as critical infrastructure, where deep encryption standards are paramount, can confidently deploy the Hirsch CPNI-approved physical access control platform,” said Mark Allen, Identiv General Manager, Premises Security Solutions. Hirsch products, like our innovative Scramblepad readers, protect critical government and infrastructure facilities" Hirsch Velocity Software Mark adds, “Hirsch products, like our innovative Scramblepad readers, protect critical government and infrastructure facilities across the UK, the U.S., and other governments around the world. Our CPNI-approved Hirsch Velocity Software security management system provides a highly scalable, end-to-end physical access control solution from the door to the server cluster, ideal for mission-critical environments. He further stated, “We are proud to continue to work with the UK government’s risk-critical sites to provide the most robust, reliable, highly secure yet cost-effective access control solution.” Hirsch PACS CPNI solution The Hirsch PACS CPNI solution encompasses Identiv’s highly secure product portfolio, including Hirsch Velocity Software, Hirsch Mx-8 Controllers, and Secure Network Interface Board 3 (SNIB3). Identiv’s suite of advanced access control solutions is approved for use in some of the world’s most security-sensitive organizations, including many UK government agencies. Hirsch Velocity Software’s security management system is an integrated platform that manages access control and security operations across thousands of disparate facilities, from single highly secure rooms to multi-building, multi-location campuses, with the most stringent security compliance. Hirsch Mx-8 Controllers Users can control doors, gates, turnstiles, elevators, and other equipment, monitor employees and visitors as they move around a facility, prevent unwanted access, maintain compliance, and provide a robust audit trail. Hirsch Mx-8 Controllers provide scalable, networked communication and are also available in two or four supervised door models. The modular design and scalable architecture enable an installation to start small and grow large, from a single controller system to a larger, multi-site enterprise. The Mx Controller is fully firmware, function, and communication protocol compatible with Hirsch systems so that existing credentials, readers, and databases can be retained. SNIB3 communication device SNIB3 is a renowned communication device that provides IPv6, Gigabit Ethernet, and AES 256 bit encryption SNIB3 is a renowned communication device that provides IPv6, Gigabit Ethernet, and AES 256 bit encryption. These features are already foundational for the critical U.S. FICAM security standard. For deployments already equipped with a Hirsch solution, SNIB3 is a drop-in replacement for Identiv’s SNIB2 and SNIB communications boards. Identiv Global Services Identiv Global Services (IGS) provides a comprehensive cybersecurity-hardening service to ensure the solution is deployed to the rigorous CPNI standard. This covers securing the operating system, database, and services, including all Identiv-supplied server components and networking equipment, as well as the Velocity client workstation. To protect against the rapidly evolving threat landscape, IGS through service-level agreement (SLA) supports the customer and the solution, updating security patches and applying the latest information assurance guidelines following UK standards and best practices.

Related white papers

Facing the Ever-evolving Hacker Head-on

RFID and Smartphone Readers in Physical Access Control

Access Control & Intelligent Vehicle Screening