Hirsch’s certification enables greater convergence
06 January, 2012
category: Contactless, Digital ID
Hirsch Identive announced that its Velocity Access Control and Security Management software has been tested and verified to be compliant with the IF-MAP computing standard by the international industry standards organization, Trusted Computing Group.
IF-MAP is a standard computing protocol that supports dynamic data interchange among a variety of IT networking components. By becoming IF-MAP compliant, Hirsch Identive’s systems can now enable organizations to implement integrated security systems alongside IT networks.
IF-MAP enables integration between physical and network access control. The first use case for IF-MAP integration with Velocity is the convergence of physical and network access control policies and permissions. For example, information about an employee’s location can be dynamically communicated from Hirsch’s physical access control system to the IT network via IF-MAP, and then access to network resources can be granted or denied based on a person’s presence in a given area or building.
Employees must present their credentials to specific readers at doors in the area or network access may be denied or limited. Those requesting VPN network privileges or access to wireless points and even industrial controls can be granted or denied based on their presence.
As a result of Hirsch Identive’s adoption of the IF-MAP standard, Velocity can now publish physical access control and security events to an IF-MAP server just as other IT network devices do. Other compliant devices can subscribe to the information and act upon it accordingly. IF-MAP compliant network devices and systems can then share data without the need to develop costly customized and easily broken point-to-point integration.
As an added benefit, the nature of this application does not require users to change access credentials. Users can still use the same cards, personal identification number and/or biometrics as before. Additionally, users can utilize existing user name and password network access credentials and leverage the existing network infrastructure.