Identiv’s IT-centric, cyber-secure Freedom Access Control system uses encryption bridges at the network edge to communicate with onsite and geo-distributed software.
It’s time to rethink PACS… And consider an innovative, IT approach to access control.
Webinar: Cyber-Centric Access Control
Security in the healthcare industry is evolving. Learn how the IoT, the Industrial Internet of Things (IIoT), cloud, and mobility are impacting security at hospitals and healthcare organizations worldwide.
View Recording »
Webinar: IT-Centric Campus Security
The IoT is changing the security industry and impacting K-12 and higher education. It’s time to adopt campus-wide, cyber-centric, easy-to-use, open-architecture access control and video solutions. Access our on-demand webinar to learn how to secure your campus today.
View Recording »
Freedom by Identiv Access Control is based on a software-defined architecture (SDA) that advances and leverages the already powerful web-scale-based applications. SDA makes it possible to change the underlying software easily without affecting the rest of the system. SDA aligns with migration from hardware-driven to software-driven architectures embraced by IT departments and IT infrastructure providers and the current trend to leverage IoT and cloud.
Physical and Logical Access Control
Centralized databases can operate independently or be connected to an IDMS (identity management system), such as Active Directory, unifying physical access control and logical security management within the IT infrastructure.
Five Reasons You Need Freedom
- Software-defined physical security perimeter: Eliminates complex control panel configurations and replaces them with technology that communicates over encrypted IP-network protocols
- Highly secure and reliable: Uses advanced encryption technology to eradicate security vulnerabilities
- Open-platform design: Enables rapid and cost-efficient integration to any relevant infrastructure
- Accessible anytime, anywhere: Monitor and grant access 24/7 via any web browser
- FICAM compliant: Fully compliant with the U.S. government’s FIPS-201 standard and HSPD-12 initiative
What’s New with Freedom 11.0?
- Email Notifications
Emails can now be generated via door held open, door forced open, and user-defined port triggered actions
Architecture allows each database instance to perform both read and write operations; multi-master replication provides the ability to administer the system in a failover event, offering a seamless transition between master and secondary replication nodes
- Home Site
Expands Freedom’s viability as an ACaaS/SaaS model platform, implementing more granularity in the partitioning/segmentation of a Freedom user (card holder) record; with this feature, site administrators are limited to the users they can manage and view
Identiv in the newsSecurityInformed.com: What Are the Security Challenges of Protecting Utilities?
Product Collateral for the Freedom Access Control
Training Videos for Freedom Access Control
- Freedom Introduction Video
- Freedom Hardware Video
- Network Centric Solution Video
- IPv4 Addressing Video
- Initial Configuration Video
- Adding a Freedom Bridge Video
- Defining Schedules Video
- Controlled Areas Video
- Access Groups Video
- User Management Video
- AMS Lite Video
- Events and Reporting Video
- DB Backup and Restore Video
- Database Replication Video
The Identiv Sales Team is here to answer your questions and get you what you need. Please give us as much information as possible and we’ll route you to the right team member.
This form is not for product support!
If you are in need of product support, please fill out our Identiv Product Support form.