+ All Categories
Home > Documents > Beyond!AccessControl:!Five!Tips fora!SmarterBuilding!! · 2019-12-18 ·...

Beyond!AccessControl:!Five!Tips fora!SmarterBuilding!! · 2019-12-18 ·...

Date post: 08-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
3
Beyond Access Control: Five Tips for a Smarter Building Mobile technology is rapidly expanding the vision and reach of Computerized Maintenance Management Software (CMMS). Security challenges continue to grow within the smart facility and throughout a more connected workplace – protecting people and assets is paramount. However, a major concern how to physically and securely link equipment to the cloud based CMMS or other business applications? These challenges must be addressed without compromising convenience and user experience. The goal is to offer and deliver services that are seamless, easier to manage and empower a more responsive, productive mobile workforce. What if you could accelerate maintenance and inspection services delivered in a mobile, trusted, connected environment? Here are five important steps to help keep pace and embrace the evolution of a smarter building. 1. Internet of Everything: RFID and the Internet of Things RFID transponders have connected physical assets like manufacturing and facilities equipment, medical devices, inventory and many more within an organization to local business applications for decades. RFID technology has simplified and automated access controls, managing and tracking inventories, and operational processes. With the surge in onthego workforce, cloud computing and mobility, the need to network physical objects to collect and exchange data in between has been accelerated. With the simple tap of a mobile device, equipment is now connected to web or mobile CMMS systems, or other preferred business applications – enabling the Internet of Things (IoT). A smart building leverages the power of the IoT to network and manage physical company assets manufacturing equipment, heating and cooling, fire and safety, and many more to a cloudbased maintenance management system. Simply tagging or embedding a trusted RFID, tag (across HF, NFC or BLE technologies) onto equipment regardless of geographical location enables companies to ultimately protect their capital equipment investment extending the assets performance and overall life. Securities and facilities organizations gain immediate access to the viability of high value assets and can rapidly respond to deliver preventive and corrective maintenance quickly and efficiently. 2. Embrace Mobility Billions of mobile smartphones are deployed worldwide and are equipped with near field communications (NFC) and Bluetooth Low Energy (BLE) capabilities. Great features, but what does this mean for facilities management? There is no longer a need to invest in additional infrastructure to access the trusted tag data. Furthermore, there is no additional mobile application
Transcript
Page 1: Beyond!AccessControl:!Five!Tips fora!SmarterBuilding!! · 2019-12-18 · Beyond!AccessControl:!Five!Tips fora!SmarterBuilding!!! Mobile!technology!is!rapidly!expanding!the!vision!and!reach!of!Computerized!Maintenance!

Beyond Access Control: Five Tips for a Smarter Building

Mobile technology is rapidly expanding the vision and reach of Computerized Maintenance Management Software (CMMS). Security challenges continue to grow within the smart facility and throughout a more connected workplace – protecting people and assets is paramount. However, a major concern;; how to physically and securely link equipment to the cloud based CMMS or other business applications? These challenges must be addressed without compromising convenience and user experience. The goal is to offer and deliver services that are seamless, easier to manage and empower a more responsive, productive mobile workforce.

What if you could accelerate maintenance and inspection services delivered in a mobile, trusted, connected environment? Here are five important steps to help keep pace and embrace the evolution of a smarter building.

1. Internet of Everything: RFID and the Internet of Things

RFID transponders have connected physical assets like manufacturing and facilities equipment, medical devices, inventory and many more within an organization to local business applications for decades. RFID technology has simplified and automated access controls, managing and tracking inventories, and operational processes. With the surge in on-­the-­go workforce, cloud computing and mobility, the need to network physical objects to collect and exchange data in between has been accelerated. With the simple tap of a mobile device, equipment is now connected to web or mobile CMMS systems, or other preferred business applications – enabling the Internet of Things (IoT).

A smart building leverages the power of the IoT to network and manage physical company assets;; manufacturing equipment, heating and cooling, fire and safety, and many more to a cloud-­based maintenance management system. Simply tagging or embedding a trusted RFID, tag (across HF, NFC or BLE technologies) onto equipment regardless of geographical location enables companies to ultimately protect their capital equipment investment -­ extending the assets performance and overall life. Securities and facilities organizations gain immediate access to the viability of high value assets and can rapidly respond to deliver preventive and corrective maintenance quickly and efficiently.

2. Embrace Mobility

Billions of mobile smartphones are deployed worldwide and are equipped with near field communications (NFC) and Bluetooth Low Energy (BLE) capabilities. Great features, but what does this mean for facilities management? There is no longer a need to invest in additional infrastructure to access the trusted tag data. Furthermore, there is no additional mobile application

Page 2: Beyond!AccessControl:!Five!Tips fora!SmarterBuilding!! · 2019-12-18 · Beyond!AccessControl:!Five!Tips fora!SmarterBuilding!!! Mobile!technology!is!rapidly!expanding!the!vision!and!reach!of!Computerized!Maintenance!

2

to develop or maintain. Most tenants, maintenance crews, security personnel, and contractors already have these devices, and are familiar with using them. NFC and BLE eliminate barriers to deploy cloud-­based services or automate processes using mobile. These communication protocols coupled with authentication services can securely connect mobile services to facilities systems with the simple tap of a mobile phone or tablet.

3. Add Trust without Compromising Compliance or Experience

A wide adoption of mobile and other “things” joining the IoT can expose a weak link in some security and facility practices. A simple NFC tag unique digital identifier is openly accessible and can easily be cloned e.g. to fake presence reports. To protect this link, implementing trusted tags and cloud authentication into a CMMS protects intellectual property and minimizes potential threats to the maintenance and service ecosystem. Additionally, organizations can ensure and maintain compliance across asset inspections, by automating record keeping and reporting. The secure tap provides undeniable proof and each transaction is secure every time. The mobile device acts as the trusted ID reader, and an authentication environment in which all tag and ID transactions are secured by end-­to-­end encryption. The trusted cloud-­based model is especially valuable for organizations that must manage mobile applications, access and geographically dispersed facility locations.

4. Make it Simple and Automated

There is an increased desire to improve organizational communication and minimize disruption of equipment productivity. Implementing processes that are automated and easy to follow makes it easier for teams to use and comply with manufacture’s warranties, service agreements and even mandated city ordinances. Today there may be multiple applications and antiquated paper processes to follow when initiating a service or inspection request. People often toggle between systems with different security protocols within the same facility or organization. Simplifying these actions will improve service workflows, organizational communication, and accountability.

With a solution based on the combination of mobile, trusted tags and cloud-­authentication, CMMS users can easily initiate work orders and service calls, automate technician deployment, monitor and track service events across multiple geographies, authorize and secure the technicians transactions using strong authentication credentials. Using a mobile phone, a trusted tag tap identifies equipment, open a service ticket, authorizes technician, and provides SLA’s, service history and manuals, confirm time, duration and status of completion improving billing accuracy. Furthermore, this same approach is used to manage inspection and compliance activities across regulated equipment.

Page 3: Beyond!AccessControl:!Five!Tips fora!SmarterBuilding!! · 2019-12-18 · Beyond!AccessControl:!Five!Tips fora!SmarterBuilding!!! Mobile!technology!is!rapidly!expanding!the!vision!and!reach!of!Computerized!Maintenance!

3

5. Piece it together, Integration Made Easy

HID Trusted Tag® Services is the missing link to take maintenance and inspection automation to the next level to connect a physical piece of equipment to the CMMS for secure, intuitive, and mobile management of high-­value facilities equipment and assets across the organization and geographies.

• A trusted tag enables the IoT – Tagging equipment securely links the connection between the equipment and CMMS. Each tap is unique, cryptographically secure and effortless.

• Use existing technology – Trusted Tag Services integrates with most mobile devices (NFC or BLE enabled) that are typically deployed to field service technicians. Facilities or property managers do not need to invest, develop, install, or manage additional applications. Additionally, there is no need to deploy new IT infrastructure, equipment or software. The CMMS uses a single web service call into HID Trusted Tag Services, streamlining implementation.

• Secure credentials and authentication – indisputable secure access and proof of services for accurate reporting and billing, real-­time data collection, and many advanced features enhancing the user’s CMMS experience. HID Cloud Authentication is an ideal combination for CMMS applications. The result is the authenticity of the employee or contractor tap on the trusted tag during service calls. Encrypted data changes on every tap, blocking attempts to share, clone or manipulate secure tags or URLs -­ secure transaction experience across the services workflow during initiation through to completion.

The issue of protecting people and assets in the smart building will continue to move to a strong experience-­driven focus. New trusted solutions will have a dramatic impact on how facilities are designed, built and managed making daily life easier and more productive for employees and contractors the most important elements in any security and facilities strategy. Trust that you can stay true to the mission – protecting people and assets and not compromising on user experience. hidglobal.com/internet-­of-­things

About HID Global

HID Global is the trusted source for innovative products, services, solutions, and know-­how related to the creation, management, and use of secure identities for millions of customers around the world. The company’s served markets include physical and logical access control, including strong authentication and credential management;; card printing and personalization;; visitor management systems;; highly secure government and citizen ID;; and identification RFID technologies used in animal ID and industry and logistics applications. The company’s primary brands include ActivID®, EasyLobby®, FARGO®, IdenTrust®, LaserCard®, Lumidigm®, Quantum Secure and HID®. Headquartered in Austin, Texas, HID Global has over 2,200 employees worldwide and operates international offices that support more than 100 countries. HID Global® is an ASSA ABLOY Group brand. For more information, visit www.hidglobal.com

© 2016 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission. All other trademarks, service marks, and product or service names are trademarks or registered trademarks of their respective owners.

hid-­idt-­smart-­building-­eb-­en PLT-­03090


Recommended