You are on page 1of 57

Company and

Portfolio Overview
Our Mission: Making the Physical World Safer and Convenient

London address:
5 London Wall Buildings, London EC2M 5NS, England
Europe address:
Identiv GmbH, Oskar-Messter-Str. 12, 85737 Ismaning, Germany
Physical Access Logical Access Credentials RFID Inlays
Control and Video Control and Tags
When it comes to high security at the From remote authentication to Our end-to-end credentials portfolio We’re experts in designing and
lowest cost, our robust, feature-rich embedded applications, get the tech covers all of the bases, from manufacturing RFID inlays and tags
systems support frictionless access to keep you moving (or at home) and proximity to high-security, and for embedded use in billions of
managed from anywhere. keep your data safe and secure. highlights every form factor. everyday objects in the IoT.

2
At a Glance
Expansive Core Technology Platform
• RFID, smart cards, access control,
secure authentication, video, analytics,
and vertical applications

Global Presence
• 360 global employees
• Long-established engineering centers in
the U.S., Germany, Singapore, Canada, and
India
• Sales and services deployed globally

Corporate Headquarters
Fremont, CA
NASDAQ: INVE

3
Physical Access Control – Identiv Platforms
Performance, security, and aesthetics. An innovative selection. And a global standard for over three
decades.

Government
Compliance Solutions IT-Centric Access (Enterprise) IT-Centric Access (SMB)

Hirsch Velocity - ACaaS Freedom Cloud - ACaaS Physical Access Readers

4
Products and Services
EMEA - Products & Services pillars

Asset
Asset
PACS
PACS VMS
VMS IGS
IGS Cloud
Cloud SPOG
SPOG
Tracking
Tracking

 Hirsch  Velocity Vision  Integrations  Tagging  Opex / Capex  Central monitoring


 Freedom  3VR  Migrations  Inventory control  VMS / ACS  Acknowledge and
 Controllers  Analytics  Solution building  Hirsch  Managed service monitor alarms
 Readers  End to End (inc.  CPNI servers  Velocity Vision  Hybrid
 Bio-metrics Cameras & IT  SLA  Disaster recovery
 Credentials Hardware)  Neutral carbon
footprint

11 | 11
Physical Access Systems
Velocity™ Management Software
• 2 Versions “Express” and “Server”
• Velocity 3.8.3 (3.8.4 in engineering)
• TLS Encryption v1.2
• Enterprise security management system
• Includes Web console
• Support for Windows 10 and Windows
2019/2019R2 Operating Systems
• Support for MS SQL Server 2012, 2014, 2016 and
2017
• Support for IPV6 and SNIB 3
• FICAM & CPNI compliance
• Scalable (no artificial limits)
• Mx and DIGI*TRAC Controller Support
• Native and IGS Integrations
• Includes Web Console

13 © 2021 Identiv, Inc. All Rights Reserved.


Freedom Product Overview

● Software-based, network-centric Access Control system with low


footprint controllers.

● Web-based management, available anywhere, anytime.

● IP-Based door controllers that store no data, and maintain a persistent,


encrypted connection to the Freedom Software.

● As scalable as the IT network

● Simplified Architecture and reduces system complexity

● Reduced cost of deployment by leveraging existing IT infrastructure

14 © 2021 Identiv, Inc. All Rights Reserved.


Hirsch Mx Controllers - Velocity
• Overview
• Mx-1-W License to enable wireless
• 1, 2, 4, and 8-door capacity (CCM controlled)
lock • Compact size
• POE+ for reader and electric strike
• Additional expansion board capacity
• Plastic Case and NEMA metal
enclosure • Compatible with DIGI*TRAC on Velocity 3.5
• Direct Wiegand or RS-485 connections
• UL294, 1076AA, CE
• Customer benefits
• Price aligns with capacity
• Internal power supply/dual UPS • Start small, grow capacity as needed
• NEMA metal enclosure • One controller for all applications
• Medeco key and tamper switch
• Pack more power into a smaller footprint
• Foundation for secure communications

15 © 2021 Identiv, Inc. All Rights Reserved.


Hardware Mx Family Expansion
Mx-8 Mx-4 Mx-2 Mx-1-PL Mx-1-ME
(Optional
Exit
Reader)
(Optional
Exit
Reader)

UL2043 Rated
Plenum Rated

SNIB3
SNIB3 Secure Network Interface
Database
Board
RREB RS-485 Expansion Board
Add up to 8 doors (with an additional 8 exit doors)
Add up to five expansion
boards per controller
AEB8 Alarm Expansion Board
MX-N S3OB
Add up to 8 alarm inputs (Up to 40 per controller)
SNIB3 on board

REB8 Relay Expansion Board


Add up to 8 outputs (Up to 40 per controller)
Altronix TROVE Server Rack Mount Enclosure for Mx
Overview
● 2U Server Rack Enclosure for Mx-2, Mx-4 & Mx-8
● Includes Controller PS, 8 Lock PS and optional
Voltage Reg. & 12V Disti board for REXs
● Includes RREB, 2 x AEB8, 1 x REB8

Customer Benefits
● High door density, rack mount PACS HW solution
● Includes PS for controller and up to 8 locks
● Great option when wall space isn’t available or for
sites with high door count
● Pre-wired for easy install, access & management

17 © 2021 Identiv, Inc. All Rights Reserved.


Freedom Bridge Options

Freedom Encryption Single Reader Dual Reader Bridge I/O Bridge Output Bridge IoT Gateway
Bridge Bridge (Available soon)

Reader Inputs: 1 2 N/A 2* 2 (includes OSDP)

Inputs (Supervised): 2 (2) 4 (4) 12 (4) - TBC

Relay Outputs 1 2 2 24 TBC

* Supports 2 Wiegand output card readers over RS-485 through the elevator travelling cable using a LIBERTY
Wiegand to RS-485 device (50-80-W485) connected to the readers in the elevator cab.
** Capacities and Historical transaction volume contingent upon available storage space on the LIBERTY cube.

18 © 2021 Identiv, Inc. All Rights Reserved.


Freedom Smart Bridge - IoT

• Supports 2 Wiegand readers


• Powered via PoE+ or 24vDC
• 1GbE port (802.3ab)
• 3 sets of DTLM inputs (Up to 9 supervised inputs)
• Supports up to 50k event logs in offline mode
• Stores up to 500k user credentials
• TSL1.2 connection to master server
• Can connect to server via IP address or DNS name (url)
• TAA Compliant
• UL294, UL20043, UL2610
• Plenum-rated housing
• Mountable via DIN rail or integrated slots (banjo holes)

19
Identiv uTrust TS Readers
• Identiv access readers support
virtually all card data formats
• Proximity: HID, AWID, Indala, GE
• HF: MIFARE, DESFire, iClass CSN, NFC
• Identiv access readers support
multiple communications formats
• Wiegand (connects to any Wiegand-
compatible controller)
• RS485/TCI/IP (for firmware updates and bi-
directional communications)
• Wall mount or mullion mount
• Terminal strip or pigtail
• ScramblePad available with Hirsch
encryption or open Wiegand data
communications to controllers

20 © 2021 Identiv, Inc. All Rights Reserved.


MobilisID Reader
• and Proximity Smart Reader

• Mullion Form Factor with single gang


mounting support

• Wiegand Based

• Capacitive sensor technology allows for


touchless entry

• Multi-color, Animated LED Ring

• In-field firmware update support

21 © 2021 Identiv, Inc. All Rights Reserved.


OSDP Spec support for 3rd Party Readers
Overview
● The latest open source spec from SIA
● Enables additional manufacturer’s readers to be
supported on Mx
● Support for enhanced functionality and features

Customer Benefits
● Support for expanded peripheral devices that
support OSDP spec
● Support for various reader technologies not
supported by TS readers (Bio & UHF)
● Wider customization options through Velocity
configuration GUI

22 © 2021 Identiv, Inc. All Rights Reserved.


Biometric readers integrated into Identiv access control platform

The most proven contactless The ultimate face recognition


fingerprint technology device for access control

23 © 2021 Identiv, Inc. All Rights Reserved.


3-Factor Reader - TS Reader with Biometrics
Overview
● First Touchscreen based TS Reader
● 3 Factor Auth: Biometric, Contact and
Contactless
● Support ScramblePad functionality

Customer Benefits
● Direct Replacement for ScramblePad
● Lowest cost 3FR on the market
● IP66 rating for all environment installation
● No software licensing costs to support

24 © 2021 Identiv, Inc. All Rights Reserved.


Identity
Identiv Smart Card Readers
Protect login to PCs and networks, encrypt hard
drives, and digitally sign and encipher email with
our smart card reader tech.

• Contact and contactless


• Read multiple card formats
• Standards-based
• Government-approved
• CAC and PIV
• Firmware upgrade ability
• Tokens
• USB and contactless
• Insert smart card elements
• Include accessible memory

| 26
RFID Inlays and Tags
Innovative research, design, and manufacturing. Our transponder portfolio brings smart identities and
security to the IoT.
• Custom-designed
• Inlays (HF and UHF)
• Standard labels and Tag On Metal (TOM)
• Tickets (transportation, ski lifts, events, etc.)
• Token (transit and asset tracking)
NFC Tag RFID Inlays RFID Labels • Library labels (books, CDs, DVDs, tablets, etc.)
Starter Kit UHF Tags
• uTrust Sense Temperature Tracker
• Miniaturized labels (cosmetics and pharmaceutical)
• NFC/mobile device stickers
(i.e., Giant NFC Transponder)
• Broad IoT applications in development
• Communication with everyday items, such as toys,
NFC RFID Library Labels RFID Tickets NFC-Enabled medicines, and consumer products
Temperature Solutions
Sensors • Item tracking and quality control

| 27
Credentials
Single-technology, multi-technology, or credentials with a contact chip — we’ve got what you need.

• Simple, contactless, LF uTrust Proximity


Credentials are compatible with most existing
building systems
• uTrust MIFARE Classic Credentials are versatile,
HF, interoperable, MIFARE-compatible smart cards
• uTrust TS Cards are secure credentials for PACS,
based on NXP’s MIFARE DESFire EV1/EV2 HF 13.56
MHz technology and compatible with 125 kHz LF
proximity card systems
• Designed for converged physical and logical
access, uTrust MD Smart Cards are Microsoft®
Minidriver-compatible, PKI-based credentials
• Designed for converged access, uTrust SmartID
Secure Access Credentials provide a single
credential to access buildings and/or IT systems

28 © 2021 Identiv, Inc. All Rights Reserved.


Video Management System
Velocity Vision Architecture
Web Mobile
Client Client

Management Smart
Smart Wall Client Client

Mobile
Server

Management Recording Failover


Event Server Server Server Recording
SQL Server Server

Media Media
Failover Database Database
Log
Management
Server Device Device
Server
Driver Driver

Cluster Cluster
Failover Event Server

30 © 2021 Identiv, Inc. | All Rights Reserved | NASDAQ: INVE


Velocity Vision Overview
• Velocity Vision is an enterprise level Video Management Solution (VMS) Platform that allows
customers to build out any video solution.

• It offers clients the ability to leverage all types of platforms (on premises, cloud, hybrid, mobile)
when deploying your total security solution.

• Velocity Vision gives customers a total solution.

• Available in 4 tiers, start small and grow as


the business or requirements demand.

31 © 2021 Identiv, Inc. | All Rights Reserved | NASDAQ: INVE


32 © 2020 Identiv, Inc. | All Rights Reserved | NASDAQ: INVE | BOARD CONFIDENTIAL
The Unified Solution

• Access control + video is essential


• A platform for the future
• Scalable architecture
• Video walls
• Mobile clients
• Graphics for both access control points and cameras
• Many integrations and solutions available
• Solutions for small, medium, large or enterprise
33 © 2021 Identiv, Inc. | All Rights Reserved | NASDAQ: INVE
Reasons to use Velocity Vision

Unified
Full End to Solution
End design!

One Stop Deeper 2-way


Support Integration

Flexible and
Identiv No Fee into
guaranteed
Identiv ACS
server
Integration
structure
Identiv
Manage
Integration

34 © 2021 Identiv, Inc. | All Rights Reserved | NASDAQ: INVE


3VR Architecture
A Comprehensive Video Platform
From Recording and Storage Video intelligence apps
leveraging the infrastructure
to Advanced Analytics and correlating all data for
business applications

Video analytics plug-ins


dedicated for specific
functions

Context plug-ins to integrate


with non-video events and
data

Foundation for storing


and managing video Global access and video
search across the
Enterprise

35 © 2021 Identiv, Inc. All Rights Reserved.


Why 3VR?
Customer Expectations 3VR Benefits

• Advanced forensic search


• Motion detection
• Business integrations
• Distributed processing
• Superior case management
• Audio
• Continuous video & context data conversion into event
• Alarm I/O and Alerts
cards
• PTZ control
• Analytics at the image
• Codecs
• Primary or secondary system
• Resolutions
• Distributed processing
• Management
• Bandwidth throttle
• Ease of installation
• Bandwidth schedule
• Limitations
• Pipeline management
• Comparison to other marketed VMS’s

36 © 2020 Identiv, Inc. All Rights Reserved.


Analytics

Object tracking POS

Facial Recognition
Heatmapping

Demographics
Queue management

ANPR Dwell

37 © 2021 Identiv, Inc. All Rights Reserved.


3VR Dashboard

Understand Your Customers.


3VR’s advanced video-mining technology takes
retail stores to the next level with deep, real-time
insights into shopper behavior and store
operations.

Use the Data.


Monitor the trends in age groups and gender, and heat
mapping for popular products, marketing and product
placement.

Staffing.
Monitor and optimise your staffing.

38 © 2021 Identiv, Inc. All Rights Reserved. 38


Better Value – End to End Designed Solutions
Software and
Workstations

Identiv ACS & IDS Workstations and monitors Velocity Vision / 3VR

Ethernet
Edge
Hardware

Life safety
Hirsch Mx Controller power supply Camera range Servers and storage

Edge devices

New and/or existing readers, locks (Inc. wireless), and door accessories

39
Identiv Global Services
Identiv Global Services

Design & Integration Education and


Services Training Services

Product Testing Services


Development
Services

41 © 2021 Identiv, Inc. All Rights Reserved. | 41


Third party Integrations

Security at the Edge

Wireless lock

Intrusion Detection

Visitor Management

Wireless lock
Customizable Solutions

42 © 2021 Identiv, Inc. All Rights Reserved.


Identiv Global Service Engineers to provide Cyber Security for your System

• Certified IGS Engineer available for support and consultancy


• Vulnerability Assessment
• Cyber Security Standards guideline implementation
• Complete System Hardening
• On-Site and Remote configuration
• Implementing Standard Operating Procedure (SOP)
• Providing full documentation
• Support for security package Submission
• SLA to cover routine maintenance, Scans and patches

43 © 2021 Identiv, Inc. All Rights Reserved.


Service Level Agreement
Managed Services

• Mission Critical Readiness


• Proactive approach and regular maintenance
• Upgrade of the entire security environment
Identiv Global Service • Support on-site and off-site yearly
is next to partner and • Coverage around the clock
customer for delivery
• Dedicated IGS Engineers support
first class service
on-site and remotely • Implementing Standard Operating Procedure
• Change of Management
• Training and classes
• Emergency response
44 © 2021 Identiv, Inc. All Rights Reserved.
Asset Tracking
Identiv – Asset tagging essentials
• Velocity software required
• TS readers required
• UHF reader required
• Escort mode
• Each project would require scoping

| 46
Identiv – Asset tagging concept
• Staff member presents access card
• Asset is then presented to the reader
• Asset is then assigned to the staff member

• Staff member presents access card


• Asset is then presented to the reader
• Asset is then returned to itinery
IN OUT

• UHF long reader scans the


room at preset times
• Itinery lists updated each scan

| 47
Identiv – Wider range asset tagging setup

• Identiv platform and hardware required (Premise or Cloud)


• Tags used to monitor asset
• Asset tracked in real-time via strategically placed beacons
• Existing wireless infrastructure could potentially be used
• Zoned alarm monitoring to create cause & effect responses
• Integrate with Velocity Vision for fuller monitored solution

| 48
Identiv – Tracking report in Education
• Staff & student issued a tag

• UHF long reader


scans the room at
preset times

• Readers placed at entry & exit


• Staff and students will be tagged via their tag
• Reports can be polled from a T&A setting
• Emails can be issued
• No mobile app as yet, but web page can be saved for real-time
assessing
IN OUT
| 49
Cloud services – ACS & Video
Velocity Cirrus ACaaS
Cloud-Based ACaaS Solution

• Cloud-based integrated software platform


• Manages access control and security operations
from single high secure rooms to multi-building,
multi-location campuses
• Control doors, gates, turnstiles, elevators, and
other building equipment
• Monitor users as they move around a facility
• Prevent unwanted access
• Maintain compliance
• Provide a robust audit trail Available from any computer, anytime, anywhere!

51 © 2021 Identiv, Inc. All Rights Reserved.


Freedom Cloud - Overview
● Freedom Cloud is a virtual instance of Freedom deployed via AWS and
entirely hosted by Identiv.

● Access is available 24/7/365

● The monthly or Annual fee for Freedom Cloud will include updates,
patches, and upgrades, ensuring the end user is always using the latest
version of the software

● Freedom Cloud eliminates the need for users to manage local software
or server hardware

● Configuration is handled by the Installer, while daily administration is


handled by the end user.

● Identiv manages the availability and uptime of the virtual instance and
the rest is managed by the Installer and the End user

● Included is a tertiary cube server to ensure failover capability

52 © 2021 Identiv, Inc. All Rights Reserved.


ACaaS Benefits
Lower IT Costs and Fewer IT Responsibilities

Lower Upfront Cost Lower Maintenance Up-to-Date True Enterprise Future-Proof


No on-premises access No software updates or No software updates Cutting-edge data System auto-scales to
control server required OS patches to perform or OS patches to redundancy, availability, your needs, you never
perform and security at no extra deplete resources
cost

Flexibility, Portability, and Customizability

Portability Lower Cost Everywhere Make It Yours


Access from any Access and manage Manage multiple sites, Customize how and
computer, tablet, or the Velocity system turnover, visitors, and what types of alerts you
smartphone using inexpensive vendors from anywhere see
hardware

53 © 2021 Identiv, Inc. All Rights Reserved.


Identiv Responsibilities with ACaaS
• Identiv is responsible for:
• Creating the instance
• Maintaining the instance, app, OS, and SQL

• Dealer is responsible for:


• Adding hardware
• Door groups, person groups, time zones, and operators

• Customer is responsible for:


• Adding, changing, and deleting card holders
• Monitoring events and alarms

54 © 2021 Identiv, Inc. All Rights Reserved.


Architecture

Vision
Cloud
WAN LAN

Client network

Hardware for software

Off-Premise (multiple site) cameras On-Premise (multiple building) cameras

55
Tiger bridge

• Storing huge volumes of video archives include simplicity, scalability and


affordability after term costs to be recalculated in advance of term end date

• Provides a cost-effective platform for online storage

• Tiger Bridge provides a secure and flexible connector for transparent data
movement between the local Storage systems and cloud storage residing either
locally, in a hybrid configuration or in a public/government cloud environment

• Simplified storage allocation and tiering while enabling easy growth with Vision
Cloud

Object Storage;
• Minimizes online storage requirements by using advanced data replication and
space reclamation capabilities from Tiger Technology
• Enables Vision recording server attachment to Vision Cloud Object Storage
without a gateway server
• Enables an easy, smooth transition to the cloud.
Vision
Cloud

56
Why choose Identiv
• Valued engineering

• Competitive pricing

• Best ROI per deployment

• Pre and post sales support

• Minimal hardware requirement compared to other vendors

• Thousands of full API integrations to leading camera


manufacturers

• Camera analytics at the edge can be untilised through API

• Unlimited client connections to the system at anytime (client or


Web GUI)

• No resolution loss in video (live and archived)

• Full encryption in Velocity Vision and also Tiger Bridge

• Edge Storage and Scalable Video Quality Recording

• World class Global support

57
Single Pane Of Glass
Single Pane of Glass Architecture

Alarms and Alerts

Pop Ups

Cameras

Cameras

Hirsch Velocity Velocity


Vision Fire Alarm BACnet Facial
Freedom
Recognition
BMS
Controllers Radar AC-12 SCADA Bio-Metric

59 © 2021 Identiv, Inc. | All Rights Reserved | NASDAQ: INVE


So how does this look?
• View Cameras for –
• Online status
• Alarms
• Password strength

• View servers for –


• CPU usage
• Disk space

• Enter URL’s of interest

• Monitor trends based on specific events

• Poll in BACnet alarms and events

• Pop up alerts

60 © 2021 Identiv, Inc. | All Rights Reserved | NASDAQ: INVE


Identiv Academy
Training
• Certified training to support sales, installation & service for all Identiv
portfolio
• Field based in partner, client premises, California or Washington, and
now Virtual

Up to Four-day Operator and Administrator training labs in a


traditional classroom setting.
Experience level: Basic to Intermediate, including test and
certification.

1. Self paced learning


2. Instructor led
3. Private training
4. Online technical library

65 © 2021 Identiv, Inc. All Rights Reserved.


World-Class End-to-End Product Portfolio

66 © 2021 Identiv, Inc. All Rights Reserved.

You might also like