Brivo Blog - Products Archive - Brivo Archive

Screen Shot 2014-08-20 at 1.41.16 PM

0

Posted on Mon, Nov 24, 2014 @ 09:00 AM

What is the Identity Box (IDBox)?

Posted on Mon, Nov 24, 2014 @ 09:00 AM

0

Contextual awareness, sometimes called situational awareness, helps us navigate our environments. We rely on our eyes and ears to assess verbal and nonverbal cues. Based on that assessment, we choose to stay, fight, or flee.

200315806-001

0

Posted on Tue, Nov 18, 2014 @ 11:00 AM

How to use identity to provide improved security

Posted on Tue, Nov 18, 2014 @ 11:00 AM

0

200315806-001

If you’re involved with enterprise security and access control, you tend to view the world a little differently. You enter a space and think, “How could my experience here be improved if I were already known by the space?”

iotblog

0

Posted on Mon, Nov 17, 2014 @ 11:00 AM

5 Components of Social Spaces

Posted on Mon, Nov 17, 2014 @ 11:00 AM

0

We define “social spaces” as buildings that can interact with us through our mobile devices or wearables and our social identities. Creating such spaces benefits enterprises; a social workplace or retail space results in more convenient and secure identity and access management (IAM) systems.

Crossing a DC street

0

Posted on Thu, Nov 13, 2014 @ 11:00 AM

Social cities are secured cities

Posted on Thu, Nov 13, 2014 @ 11:00 AM

0

Crossing a DC street

During last week’s Secured Cities conference in Baltimore, Maryland, our CEO Steve Van Till shared insights into how social identities improve security. He said, “The security industry is wrong. You don’t have to sacrifice security for convenience.” In fact, convenience makes for increased security.

Modern Retail Store

0

Posted on Tue, Nov 11, 2014 @ 11:00 AM

Empowered experience: the retail environment

Posted on Tue, Nov 11, 2014 @ 11:00 AM

0

Modern Retail Store

When it comes to enterprise security systems in retail environments, your concerns typically are two-fold. You seek a solution that addresses digital security challenges, i.e., data breaches and hacks.

You also seek physical security solutions. As enterprise owners, your products are just as important as your digital data. You have to protect both in order to guarantee the safety and security of your employees and your property.

In providing those two things, you begin to create an empowered retail experience.

IPAC_Display_1_WhiteBG

0

Posted on Thu, Nov 06, 2014 @ 11:00 AM

LiftMaster IPAC for streamlined visitor access

Posted on Thu, Nov 06, 2014 @ 11:00 AM

0

IPAC_Display_1_WhiteBG

We’re always looking for ways to improve the experience of visiting a space, and that includes coming to a gated entrance and having to use an analog telephone entry system. It’s an inefficient process; more often than not, the two speakers on the line only hear garble. The two people hang up, and the one in the car crosses her fingers and hopes the gate will open. Sometimes it does. Sometimes it doesn’t.

6 reasons social spaces are the future of enterprise identity and access management

Posted on Tue, Nov 04, 2014 @ 11:06 AM

0

Consumer demand often compels businesses to change. For example, today’s consumers expect to be able to interact with businesses online. That expectation has resulted in companies flocking to social media in an attempt to be where their audience is.

SaaSinfographi_cropped

0

Posted on Mon, Nov 03, 2014 @ 11:05 AM

Infographic: Real Cloud vs Fake Cloud

Posted on Mon, Nov 03, 2014 @ 11:05 AM

0

Brivo_enhanced_300-01

With the emergence of product features designed to offer security integrators the promise of recurring revenue, the physical security industry has seen an uptick in the selling of false “cloud” claims. “Cloud washing” is defined as the purposeful and sometimes deceptive attempt by a vendor to rebrand an old product or service by attaching the buzzword “cloud” to it. Inaccurate cloud claims endanger the safety of our customers and their property. This infographic demonstrates what both end users and integrators should look for when examining a number of these solutions and how to differentiate between true cloud solutions from false cloud solutions.

Information technology and enterprise security

0

Posted on Thu, Oct 30, 2014 @ 11:00 AM

How is information technology impacting enterprise security?

Posted on Thu, Oct 30, 2014 @ 11:00 AM

0

Information technology and enterprise security 2

Information technology (IT) has always had a close relationship with physical security systems. The latter often protects the former, and the former informs the latter. As the two work together, a better access control system results.

cloudsocial

0

Posted on Wed, Oct 29, 2014 @ 11:00 AM

How “available” is your Software as a Service (SaaS)?

Posted on Wed, Oct 29, 2014 @ 11:00 AM

0

cloudsocial

System availability, also known as uptime, is a key consideration when it comes to purchasing Software as a Service (SaaS). That consideration doesn’t lessen when considering a cloud-based security system like our Brivo OnAir solution; rather, the concern probably increases. When dealing with security systems, the issue isn’t only about data. It includes the physical space as well.