December 2016


Identiv Group, a Mountain Partners portfolio company, has been selected as platinum winner with their Hirsch Government FICAM solution in the category Best Integrated System for HSPD-12 FIPS201 Compliance in this year’s ASTORS Homeland Security Awards. The annual competition recognizes the most distinguished vendors in physical entry security, among others, in acknowledgment of their outstanding efforts to keep the US country safe.

This category recognizes systems that facilitate the compliance with HSPD-12, the Policy for a Common Identification Standard for Federal Employees and Contractors and FIPS 201, the Federal Information Processing Standards Publication 201 that supports Personal Identity Verification (PIV) of HSPD-12.

Identiv Group and their brand Hirsch Electronics have developed Hirsch Government FICAM solution to address an industry-wide problem of how to implement FICAM simply and with optimal performance. It provides customers a low-cost, simple to deploy, secure solution for FICAM compliance. “Long known as the premier provider of access control and security management systems for government agencies and facilities, our Hirsch government team has applied the expertise built over the years to our Velocity-based FICAM-compliant solution,” said Steve Humphreys, Identiv CEO. “Any of the thousands of doors or portals our systems control in the government space can be easily upgraded to FICAM compliance without the cost and hassle of a forklift replacement, as we leverage virtually all of the existing Hirsch system infrastructure. Being recognized by American Security Today only further reinforces the need for complete, secure, cost-effective solution for FICAM compliance” explains Humphrey the importance of the awarded solution.

Federal Identity, Credential, and Access Management (FICAM), created in 2008, coordinates the US Federal civilian agencies on execution of the related policy, standards, implementation guidance, and information technology architectures. FICAM encompasses the tools, policies, and systems to manage, monitor, and secure access to protected resources. The resources may be electronic files, computer systems, or physical resources such as server rooms and buildings.

Comments are closed.