The webcast and conference call will be open to all interested investors
Identiv will discuss the results of its 2014 second quarter on audio webcast and conference call

Identiv, a global security technology company that provides trust solutions for premises, information, and everyday items, will hold an audio webcast and conference call to discuss the results of its 2014 second quarter on Wednesday, August 13, 2014, at 5:00 PM (ET).

Jason Hart, CEO, and Brian Nelson, CFO, will host the webcast and conference call for financial analysts and investors, which will be followed by a Q&A. The webcast and conference call will be open to all interested investors. Should time allow, management will also answer questions sent to ir@identiv.com in advance of the call.

The audio webcast can be accessed by visiting the “Investor Relations” section of identiv.com and clicking on “Presentations & Webcasts”. The conference call can be accessed by dialing 888-771-4371 (toll-free within the U.S.) or +1 847-585-4405 (for international callers) using passcode 37846879.

For those unable to attend the live webcast, it will be archived following the event for 30 days in the “Investor Relations” section of identiv.com. A replay of the call will also be available for one week and can be accessed by dialing 888-843-7419 (toll-free within the U.S.) or +1 630-652-3042 (for international callers) using passcode 37846879.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...