HID Global publishes detailed mid-year update on ‘Top Trends for Secure Identity’

HID Global, the specialist in secure identity solutions, has now issued a mid-year update to its ‘Top 2016 Security Trends’, based on customer insights into key market developments across the enterprise, healthcare, banking and Government markets. In the first six months of the year, the company noted continued forward movement in the market adoption of mobile solutions and interest in the Internet of Things (IoT) as end user customers place more value on seamless environments requiring trusted digital identities with heightened security and privacy protection. 

“Customers are increasingly investing in solutions designed to afford them the flexibility to incorporate new and better capabilities that deliver a more satisfying connected experience for their users,” commented Stefan Widing, HID Global’s president and CEO. “As we move through the middle of the year, we’re experiencing a dramatic increase in customer demand for mobility, a better user experience and connected environments. We’ve also forged new partnerships with major industry players who have the same vision to create an extraordinary user experience. We look forward to unveiling more about these partnerships as deployments progress throughout the year.”

Here are HID Global’s mid-year updates to the trends that the company forecast back in January…

Trend 1: ‘Mobilising’ security will make it more pervasive and personalised: a new and more secure identity lifestyle will be built around the convenience of ever-present mobile devices. Computer and network logon, driving licenses and other applications will more seamlessly join physical security functions on phones, tablets and laptops. ‘Wearables’ will be the next step, while phones will also work with RFID tags to add security and trust to the IoT for proof-of-presence applications

Mid-year update: Demand for mobile solutions continues to grow, along with an increasing focus on security issues. Multiple studies have revealed fears about mobile security, countered by growing demand for the benefits of online and mobile functionality. The definition of mobility is also expanding to encompass the broader idea of ‘on-the-go’ convenience and efficiency, whereby smart phones can be used as both a credential and a general purpose reader for new use cases. As part of a recent deployment at the CityPoint building in London, security officers are able to use their smart phones as NFC readers. With a tap of their phone on designated RFID tags, officers can check keys in and out as well as prove their presence at shift checkpoints

Trend 2: Security will move towards a much greater focus on the user experience. This will help close the gap between planning and compliance, while also ensuring that security adapts to rather than defines end user habits and lifestyles. Old ways of authenticating will be replaced by more satisfying alternatives

Mid-year update: Customers continue to want an easier and more trustworthy way of using digital identities to access on-the-go services and applications. Studies have repeatedly highlighted the importance of the ‘user experience’. The Frost & Sullivan Asia Pacific study ranked this issue among the top two most important drivers for deploying mobile access control over the next three years. Biometrics has continued to emerge as an effective solution for bringing together security and convenience. This approach is now used at four of Brazil’s top five financial institutions to simplify an estimated two billion trusted ATM transactions conducted on an annual basis

Trend 3: Secure and connected identities will fuel safety and innovation in how we ‘work, shop and play’. The industry will enter its next new chapter of connected identities, employing multi-layered security strategies that also include biometrics in order to bind these identities to their legitimate owners

Mid-year update: An explosion of trusted digital identities began ushering in new innovation opportunities during the first half of the year. This trend is being fuelled by a growing interest in ‘wearables’ and the use of sensors for IoT-based solutions aimed at new use cases for employee productivity, asset tracking, energy management and employee safety. These developments serve as critical points of unification for trusted identities that make digital interactions more personal, contextual and valuable, and will pave the way for innovations like building occupant apps for the smart facility that enhances the user experience. During the first half of this year, financial institutions made some of the most visible advances on the trust front, adopting a multi-layered approach towards addressing potential mobile banking challenges at both the front end (consumer devices) and the back end (banking systems that recognise and facilitate legitimate user requests through mobile devices)

Trend 4: There will be more attention on privacy in an increasingly connected and ‘mobile first’ world. Identity will expand beyond people and their personal identity to the identity of objects and their authenticity, accentuating the need to protect personal information across increasingly interconnected devices, services and applications

Mid-year update: Gartner forecasts that 5.5 million new ‘things’ are being connected every day in 2016, increasing the need for embedded security and privacy technology across the payments, transportation, industrial, consumer and healthcare markets. In the earlier CityPoint example, this ‘Security of Things’ goal is achieved by adding trust to RFID tags and their interactions with mobile devices. Biometrics also continues to play a pivotal role in privacy protection for what’s now an increasingly connected world, and solutions became available in early 2016 that include intelligent encryption-enabled and tamper-resistant fingerprint devices designed to address these challenges on a more effective basis

Trend 5: Security policies and Best Practices will become as important as technology advances. The industry will sharpen its focus on not only what to deploy, but how – from the first mobile driving licenses to unified credential management systems that enable organisations to more holistically address both facility and information security. Rather than focus exclusively on preventing breaches, the industry will also adopt Best Practices for controlling what happens afterwards, such that stolen identities are useless to thieves

Mid-year update: Through mid-year, the world moved closer to deploying driving licenses on mobile phones, while two key policy issues also emerged: protecting privacy by using a smart phone’s Bluetooth connection so that end users needn’t physically relinquish their smart phones to officers and officials, and ensuring that citizens can control what data is made available to others. Beyond citizen ID, general security Best Practices and policies remain important for virtually any organisation in today’s world

About the Author
Brian Sims BA (Hons) Hon FSyI, Editor, Risk UK (Pro-Activ Publications) Beginning his career in professional journalism at The Builder Group in March 1992, Brian was appointed Editor of Security Management Today in November 2000 having spent eight years in engineering journalism across two titles: Building Services Journal and Light & Lighting. In 2005, Brian received the BSIA Chairman’s Award for Promoting The Security Industry and, a year later, the Skills for Security Special Award for an Outstanding Contribution to the Security Business Sector. In 2008, Brian was The Security Institute’s nomination for the Association of Security Consultants’ highly prestigious Imbert Prize and, in 2013, was a nominated finalist for the Institute's George van Schalkwyk Award. An Honorary Fellow of The Security Institute, Brian serves as a Judge for the BSIA’s Security Personnel of the Year Awards and the Securitas Good Customer Award. Between 2008 and 2014, Brian pioneered the use of digital media across the security sector, including webinars and Audio Shows. Brian’s actively involved in 50-plus security groups on LinkedIn and hosts the popular Risk UK Twitter site. Brian is a frequent speaker on the conference circuit. He has organised and chaired conference programmes for both IFSEC International and ASIS International and has been published in the national media. Brian was appointed Editor of Risk UK at Pro-Activ Publications in July 2014 and as Editor of The Paper (Pro-Activ Publications' dedicated business newspaper for security professionals) in September 2015. Brian was appointed Editor of Risk Xtra at Pro-Activ Publications in May 2018.

Related Posts