
Identiv releases bitse.io 3.0, simplifying the deployment of IoT applications
Identiv launched bitse.io 3.0, the latest iteration of its global IoT connecting cloud platform. The updated platform offers advanced features designed to transform …

Identiv ScrambleFactor provides privacy and security in restricted access environments
Identiv introduces ScrambleFactor, an addition to its high-security physical access control system (PACS) portfolio. The ScrambleFactor reader reimagines secure entry for the …

Identiv Enterphone Mobile protects users against security breaches
Identiv introduces Enterphone Mobile, a highly secure mobile application that brings real-time audio capabilities to the front end, elevating visitor management and perimeter …

Identiv adds networked global IO and data centricity features to Hirsch Velocity Software 3.8.4
Identiv released Hirsch Velocity Software version 3.8.4, providing security teams with networked global integrated operations (IO), holistic data centricity across the system, …
Identiv launches government-grade FIDO2 Security Keys to eliminate the need for passwords
Identiv announced the launch of its new industrial-strength, government-grade uTrust FIDO2 NFC Security Keys, providing simple, strong authentication that eliminates the need …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility