Fierce Enterprise Communications Reports on the New Identiv Connected Physical Access Manager (ICPAM) Solution
By Chris Talbot
Today, Fierce Enterprise Communications published “Identiv Bridges Network and Physical Security Using IoT Devices”, highlighting the new Identiv Connected Physical Access Manager (ICPAM) solution:
Security vendor Identiv launched the Identiv Connected Physical Access Manager, an Internet of Things access control system that provides both network and physical security by integrating with Cisco routers, switches, video and telephony products into what is touted as a low-cost monitoring and protection product.
The ICPAM is a bit of an oddity, as it merges network access control with Internet of Things and physical security – all of which are important to have control over for a truly secure environment. In its announcement, Identiv indicated the new product breaks from tradition, as it’s based on industry standards rather than proprietary technology, and it appears the company has signed on several networking and IoT partners to make that happen. Still, the focus is on Cisco security and networking products, suggesting those are a requirement to the ICPAM product for full effectiveness. It’s also being sold through Cisco’s reseller partners.
“Premises solutions are evolving from proprietary bespoke systems to becoming part of an interconnected environmental ecosystem. ICPAM is an access management solution that provides a platform that connects and collects information from an array of Internet of Things (IoT) devices and sensors,” said Jason Hart, president of Identiv, in a statement.
What’s interesting is the attempt to create a bridge between network security and physical security using IoT devices.
Tying into the network, the ICPAM is outfitted with Power over Ethernet (PoE) for local door controllers, multi-frequency door readers and sensors, as well as management software. That’s on the physical security side. On the network access control side, it has overall premises-based monitoring features, as well as intrusion, remote, a VoIP guard and the ability to extend its security capabilities across a dispersed enterprise.
See the original article posted here.