HID Global launches IoT Solutions to Offer Organizations a NEw Level of Asset Management and Equipment Monitoring

Company adds Item Management to its HID Location Services and launches new HID Condition Monitoring Services that analyze equipment performance and health

HID Global announced its extended portfolio of innovative Internet of Things solutions (IoT) with its latest offerings that help organizations take the leap to a new level of asset and equipment management. HID Location Services for Item Management precisely monitors the location and movement of assets and equipment across multiple locations or in a specific area, and the new HID Condition Monitoring Services provides real-time analysis of equipment performance and health. The offerings provide a simple solution for streamlining the daily operations in hospitals, manufacturing facilities, and a wide range of industrial organizations requiring instant, actionable data to optimize workflow, processes and equipment efficiency.

“Every day, organizations seek to address pressing concerns around the misuse, tampering and theft of assets, as well as unforeseen equipment downtime.  HID’s latest solutions make it possible to quickly locate items, provide valuable equipment data to optimize equipment efficiency, and react quickly to critical events or instantly know when equipment fails,” said Mark Robinton, Director of Strategic Innovation with HID Global.  “Our new condition monitoring services enable operations teams to move from a reactive or prescriptive stance to a more knowledge-based, predictive model that makes it possible to receive advanced warning of issues with equipment and proactively plan for scheduled maintenance based on algorithms and data analytics.”

HID Conditioning Monitoring Services enable organizations to create predictive and actionable analysis for optimal performance of vending machines, conveyor belts, heating and cooling systems, medical equipment, and other equipment.  In addition, the services help determine the health and predict failure of motors, generators and other motorized machinery, while also leveraging its powerful policy engine to quickly identify potential issues and provide alerts so organizations can take action to reduce downtime.

The new HID Location Services for Item Management capabilities dramatically enhance item and asset management by quickly locating a broad range of items, such as ladders, carts, and emergency hospital equipment. In scenarios where an item’s location impacts workforce safety, facility managers can use geo-fences to easily deploy alerts by simply establishing policies that monitor incoming vehicles, hazardous materials or dangerous equipment in multiple locations.

Enabled by Bluvision, an HID Global company, the offerings are based on a common platform for seamless deployment and lower deployment cost, plus they leverage Bluetooth Low Energy (BLE) for precise, real-time location services.  Both include an HID cloud service, Bluetooth beacons in multiple form factors, and BluFi gateways; deployment simply entails plugging in AC-powered BLE/WiFi gateways and attaching beacons to items and equipment. The solutions’ cloud-based model and minimal hardware requirements also eliminate expensive infrastructure setup of antennas, servers and wired infrastructure to further reduce the total cost of ownership.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3