HID Mobile Access Bringing the Magic Back to PACS Brian Bloomingdale

Slides:



Advertisements
Similar presentations
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Advertisements

HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
The Natural way for Secure Mobile v.1.4
A Guide to Getting Started
Android in the Cloud Chromebooks, BYOD and Wearables Joel Isaacson Copyright 2014 Joel Isaacson
Empowering Your Users-Security & Mobility Bil Martin 1.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
The Smart watch 1. ① Introduction ② ADVT.&DISADVT. ③ Examples ④ Future ⑤ Conclusion Agenda 2.
Lior Rubin PTS. What is it ? o The Microsoft Enterprise Mobility Suite (EMS) helps give users a more secure and integrated productivity experience with.
PAYware Mobile Android Comparison June 2013 For Internal Use Only.
Make HTML5 Magazine from PDF/Photos/Office Files.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Mobile Device Security Threats Christina Blakley Host Computer Security.
Selecting the Management Platform Cloud-based Management Standalone Windows Intune No existing Configuration Manager deployment Simplified policy.
How to Enable Account Key Sign Instead Of Password In Yahoo? For more details:
2016 LOGO Comparison Between Apple Pay and Ali Pay Zhu Liang Li Zhihao
My2N – Mobile Video Technical Training
Mobile Operating Systems
File Management in the Cloud
WorkDiff Mobile, Scenario-Based Collaboration Solution WorkDiff Allows Users to Work Differently While Using Familiar Functions of Microsoft Office 365.
Jio Customer Care Toll Free Helpline Number
Paytm App is your one-stop destination for all your needs
Office 365 is cloud-based productivity, hosted by Microsoft.
Mobile App – For iOS and Android Devices
Utilize Internal Data via Mobile Business Apps
Top 10 Strategic Technology Trends for 2013
ActivID Tap Authentication HID Global
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
2N® Access Unit Bluetooth
Microsoft Ignite /18/2018 8:30 PM BRK2065
Merging Security and Convenience with Seos® Credential Technology
Booklet365 Office 365 Outlook Add-In Makes Easy Work of Managing Schedules for Fitness Gyms, Sports Associations, Trainers, and Their Customers Partner.
Multifactor Authentication
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
CompTIA IT Fundamentals Study Guide (FC0-U51)
Secure Element API An introduction.
Changing of Apple ID Payment Information Settings  Open Settings and go to iTunes & App Store  Tap on Apple ID – this brings up a menu  Tap on View.
VERSATILE NETWORK ATTACHED DOOR ACCESS CONTROL SYSTEMS
Cesar Lomeli.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
An Introduction to Online Timetabling
UW Trustee Conference Calls
Cesar Lomeli.
Scan this code with a QR reader to easily download the app.
Wavestore Integrates…
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
TDW-11: 24-28th April 2017, Noumea, New Caledonia
Welcome To Dancing Unlimited Hurricane WV 2017 – 2018 Dance Season.
UCO BANK HONOURS YOUR TRUST
MOBILE AND TABLET DEVICES
Top 10 Strategic Technology Trends for 2013
TDW10: April 2016, Noumea, New Caledonia
2N® Access Unit Bluetooth
Introduction to Axeze.
AddIn Intranet for Office 365 Lets Teams Contribute and Communicate from Any Device. AddIn Analytics on Microsoft Azure Measures Employee Adoption Partner.
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
Benefits and Wellness – MDLIVE
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
2N Access Unit 2.0 Multi-technology access control readers.
Multi-Factor Authentication
MyLion Registration Website | Mobile device
ZICA MOBILE APP.
Purple Deck Media, Inc. Jim Sulfare, Jr. - CEO
New type of devices for identification of users of “Raiffeisen ONLINE” – Hardware and Software Tokens.
2N® Access Unit Bluetooth
Presentation transcript:

HID Mobile Access Bringing the Magic Back to PACS Brian Bloomingdale Regional Sales Manager – HID Global 2017 USERS CONFERENCE

Brian Bloomingdale Introduction & Welcome HID Global Northeast RSM bbloomingdale@hidglobal.com 315-391-6689

“Virtual credentials are an alternative source of credential management”

Source: IHS – Mobile Technology Subject: Mobile Data 2016 Why Mobile Access? Mobile Access By 2020, global mobile credentials are expected to grow at a CAGR of 140% to reach 136,000,000 downloads 20% of all credentials will be mobile by 2020 70+% of surveyed decision makers believe mobile credentials will improve their overall access control systems Source: IHS – Mobile Technology Subject: Mobile Data 2016 Source: The State of Physical Access Control, ASIS International, 2017

HID Mobile Access: Powered by Seos Breakthrough Seos credential technology offers more: More choice: Freedom to choose the right mix of devices, platforms, communications protocols, operating systems and use cases to fit your needs More applications: empowers more applications onsite and on-the-go than ever More confidence: Instills confidence with best-in-class security and privacy protection

Physical Access Control Traditional Architecture

Changing the Card to a Mobile Device Over-the-Air Credential Management Physical Access Control

Elements of HID Mobile Access 4) iCLASS SE Reader unlocks door 3) Tap or Twist and Go 1) Administrator manages users, issues/revokes Mobile IDs via the HID Mobile Access Portal 2) Mobile IDs are transferred into device over the air

Mobile Access - Remote Provisioning Experience Admin enrolls user via portal – this sends invitation email 1 Google Play Apple Store Download App 2 Contains download link and registration code Open Invitation Email Enter registration code and accept license policy Register

NFC and/or Bluetooth NFC – Host Card Emulation Supported by iCLASS SE readers natively Android 4.4+ only Tap (short range) only Supported by iCLASS SE readers with added module Android 4.3+ or iOS 7+ Tap (short range), Twist & Go (long range), Wearable Support

Tap or “Twist and Go”? Manage via Android Config App: Tap (close range) Twist and Go (longer range) Tap-in Meeting zones Garages Entry gates Warehouses Loading bays Combined security Turnstiles Remote buildings

Supported Devices Phones & Tablets Wearables New & Regional Android Models Latest Apple Models Process to accelerate new device support Wearables Apple Watch Android Wear: Moto 360, Sony SmartWatch 3, LG Watch 100, LG Watch 110, Asus ZenWatch

Smart Devices vs. Cards Smart Devices Cards Easy to keep with you User desire for wide range of uses Typically user-owned and controlled Online via tethering Wide range of costs User more likely to safeguard device User less likely to share device Cards Easily displayed credential Unlimited battery life Issuer controlled Mature processes to deploy and manage Not always convenient Always offline Low cost

HID Mobile Access® - Security Mobile devices are not easily lost, forgotten, or stolen A missing mobile device is reported almost immediately Mobile IDs can be revoked remotely over-the-air Mobile IDs can be deactivated in PACS system Mobile Devices applications can be protected with biometric and/or passcode

64 1100+ 433 25 HID Mobile Access® IN Countries End Customer Organizations 433 25 THROUGH AND Channel Partners Technology Partners April 2017 For Internal Distribution Only