Internet of things Security

Identiv Announces Hirsch Velocity Software 3.8.4 with New Networked Global IoT and Data Centricity Features

Identiv Announces Hirsch Velocity Software 3.8.4 with New Networked Global IoT and Data Centricity Features
Written by ga_dahmani
Identiv Announces Hirsch Velocity Software 3.8.4 with New Networked Global IoT and Data Centricity Features

Identiv’s Hirsch Velocity Software is an integrated security management system that manages access control and security operations at facilities around the world, from single high-security rooms to multi-building, multi-location campuses. Velocity provides the security and functionality expected from high-end systems with the ease of use found on entry-level platforms. It offers strict security compliance, interoperability, and options for expansion and flexibility. The platform is designed to be used with the Hirsch family of controllers, uTrust TS Readers, uTrust TS Cardsand speed vision intelligent video management system (VMS). It also integrates with the industry’s leading intrusion detection, video surveillance, visitor management, and security services.

Velocity 3.8.4 adds global IoT, data centricity, and an updated web client to the industry-leading platform. Networked global IO provides cutting-edge computing capabilities and enables panels to share information with each other and with readers. In the event of a software failure, the panels continue to function and are not dependent on the host server. With data centrality, the software now supports more data comprehensively across the system, creating a path to synthesize that data. The lightweight web client simplifies access control without the need for a full installation, improves the user interface (UI), and moves toward a software-as-a-service (SaaS) model.

“With the latest release of Velocity, we’re making our controllers smarter by providing a platform where they talk to each other,” he said. mark allen, Local Identiv GM. “As the physical security industry implements artificial intelligence, controllers at the perimeter are no longer managed by the host server and must think for themselves. Global IoT network intelligence represents that step toward AI. Before Before controllers can begin to interpret, track trends and react to data, they need to master data collection. We are very excited to support this evolution in the industry.”

Velocity enables administrators and operators to access real-time system information, enrollment, and control functionality through a supported browser on almost any device. Control doors, gates, turnstiles, elevators, and other equipment, monitor users as they move through a facility, prevent unwanted access, maintain compliance, and provide a robust audit trail. The system also enables lockdown and contact tracing capabilities, giving security operators and dispatchers across the campus an affordable, integrated platform for emergency physical security, campus lockdown, and post-event forensic reporting.

In addition to changes to the user interface and Network Global I/O (NGIO) in the Velocity Web Server Client, version 3.8.4 also includes:

  • Shared areas in Who’s Inside for Global IO
  • Federal Identity and Credentials Administration (FICAM) Wireless Lock Controllers
  • Badge Designer Enhancements

Identiv’s physical access control and video intelligence solutions Provide the highest security at the lowest cost. Robust, feature-rich systems, hardware, and software verify frictionless access managed from anywhere. For more information on Identiv’s complete end-to-end portfolio, call +1 888.809.8880, contact [email protected]or book a ride.

About Identity
Identiv, Inc. is a world leader in digital protection of the physical world. Identiv’s platform spans RFID and NFC, cybersecurity, and the full spectrum of audio, video, and physical access security. Identiv is a publicly traded company and its common shares are listed on the NASDAQ Stock Market LLC in the US under the symbol “INVE”. For more information visit

Identity Media Contact:
[email protected]

SOURCE Identifier

About the author


Leave a Comment