woman using HID OMNIKEY desktop reader

Connected Workplace Myths — Busted

How Well Do You Know the Connected Workplace?

The concept of the connected workplace, where one credential can be used to access multiple physical and digital spaces, is undeniably appealing. Instead of juggling several cards, keys and badges or remembering a plethora of passwords, authorized individuals rely on one simple, convenient, trusted identity. It’s a straightforward solution, but still often shrouded in confusion. Let’s take a look at a few of the most common myths about connecting business systems:

Myth: Connecting systems requires a complete credential overhaul. 

Fact: It’s usually a matter of enhancing an existing credential.

You’ve already invested in access control systems; getting rid of all of them in favor of a new solution seems wasteful and daunting. Luckily, connected systems usually leverage existing infrastructure. The same card employees use to open their office building’s front door can be used to access time clocks, vending machines, elevators and more — actually improving the ROI of your current systems.

Myth: Readers are complicated to install.

Fact: Credential readers vary in complexity.

If there is space available, standalone desktop models like HID’s OMNIKEY® are fairly plug-and-play. Reader chipsets and modules are great options with varying complexity that can be installed into an existing application — like adding an RFID reader inside a printer’s housing.

Myth: You have to choose one solution to use throughout your organization.

Fact: Mixing reader types and requirements is common.

Some areas require more security than others, and your access control should be able to adjust to those needs. For example, an organization may choose an RFID badge for building entry but require multi-factor authentication with a PIN or fingerprint in highly secure areas. With this approach, authorized individuals still only need to carry one credential.

Myth:  Technology changes so quickly, investing in credentials and readers is risky.

Fact: The more things change, the more they remain the same.

It’s true that technology is always being improved, and the next big thing is just around the corner. Some aspects, however, will be constants for years to come. RFID is the most common and wide-ranging way credentials and readers exchange information, and will continue its dominance for the foreseeable future. With RFID, a credential sends information to a reader through radio frequency. The reader’s antennae pick up the signal, recognize it as a trusted identity and grant access to the physical or digital space being secured. RFID is not only used in cards and badges, either. It also powers access through wearables, like smart watches, and even mobile phones. Styles may change, but the underlying technology is unlikely to experience a serious shift.

A more convenient and connected workplace can be yours, thanks to a single credential. Ready to start your journey? Read our white paper, How to Connect Business Systems: A Breakdown of the First 5 Critical Steps.

Christian is Director of Product & Program Management and responsible for the Embedded and Desktop RFID portfolio for the Extended Access Technologies Business Area, including iCLASS SE Reader Module and OMNIKEY. He has two degrees in electrical engineering and business administration and more than ten years of experience in product management for different industries.


HID Origo™ 개발자 포털 소개

HID Origo™ 개발자 포털의 가용성에 대한 소식을 전해 드릴 수 있게 되어 기쁘게 생각합니다. 이 포털에서는 기술 파트너들에게 직원들의 물리적 및 디지털 경험과 기술이 혼재하는 앱과 API 통합을 구축하는 데 필요한 도구와 지원을 제공합니다.

10월은 국가 사이버 보안의 달입니다

매년 10월은 정부와 사이버 보안 업계가 협력을 도모하기 위해 지정한 국가 사이버 보안 인식의 달(NCSAM)입니다. 이 교육 기간 동안 유익한 정보를 통해 기업과 개인이 온라인에서 스스로를 보호할 수 있는 방법에 대한 인식을 고취시킬 수 있습니다.