infotechlead

HID Global updates security trends for 2016

Stefan Widing, president and CEO of HID Global
HID Global, a provider secure identity solutions, today released a mid-year update to its top 2016 security trends.

“Customers are increasingly investing in solutions that give them the flexibility to incorporate new and better capabilities that deliver a more satisfying connected experience for their users,” said Stefan Widing, HID Global President and CEO.

Following are HID Global’s mid-year updates to the trends that the company forecasted in January:

Trend #1: “Mobilizing” security will make it more pervasive and personalized: a new, more secure identity lifestyle will be built around the convenience of ever-present mobile devices. Computer and network logon, driver licenses and other applications will more seamlessly join physical security functions on phones, tablets and laptops. Wearables will be the next step, and phones will also work with RFID tags to add security and trust to the IoT for proof-of-presence applications.

Mid-year update: Demand for mobile solutions continues to grow, along with an increasing focus on security issues. Multiple studies revealed fears about mobile security, countered by growing demand for the benefits of online and mobile functionality. The definition of mobility is expanding to encompass the broader idea of “on-the-go” convenience and efficiency, where smartphones can be used as both a credential and a general-purpose reader for new use cases. In a recent deployment at the CityPoint building in London, security guards are able to use their smartphones as NFC readers; with a tap of their phone to RFID tags, guards can check keys in and out and prove presence at shift checkpoints.

Trend #2: Security will move to a much greater focus on the user experience: This will help close the gap between planning and compliance, while ensuring that security adapts to rather than defines end-user habits and lifestyles. Old ways of authenticating will be replaced by more satisfying alternatives.

Mid-year update: Customers continue to want an easier, more trustworthy way to use digital identities to access on-the-go services and applications. Studies repeatedly highlighted the importance of the user experience — the Frost & Sullivan Asia Pacific study ranked it among the top two most important drivers for deploying mobile access control over the next three years. Biometrics continued to emerge as an effective solution for bringing together security and convenience — this approach is now used at four of Brazil’s top five financial institutions to simplify an estimated two billion trusted ATM transactions annually.

Trend #3: Secure, connected identities will fuel safety and innovation in how we work, shop and play: The industry will enter its next new chapter of connected identities, employing multi-layered security strategies that also include biometrics in order to bind these identities to their legitimate owners.

Mid-year update: An explosion of digital identities began ushering in new innovation opportunities during the first half of the year. This trend is being fueled by a growing interest in wearables and use of sensors for IoT-based solutions aimed at new use cases for employee productivity, asset tracking, energy management and employee safety. These developments serve as critical points of unification for trusted identities that make digital interactions more personal, contextual and valuable, and will pave the way for innovations like building occupant apps for the smart facility that enhance the user experience. During 2016, financial institutions made some of the most visible advances on the trust front, adopting a multi-layered approach to addressing potential mobile banking challenges at both the front end (consumer devices) and the back end (banking systems that recognize and facilitate legitimate user requests through mobile devices).

Trend #4: There will be more attention on privacy in a connected and mobile-first world: Identity will expand beyond people and their personal identity to the identity of objects and their authenticity, accentuating the need to protect personal information across increasingly interconnected devices, services and applications.

Mid-year update: Gartner forecasts that 5.5 million new “things” are getting connected every day in 2016, increasing the need for embedded security and privacy technology across the payments, transportation, industrial, consumer and healthcare markets. In the earlier CityPoint example, this “Security of Things” goal is achieved by adding trust to RFID tags and to their interactions with mobile devices. Biometrics also continues to play a pivotal role in privacy protection for an increasingly connected world, and solutions became available in early 2016 that include intelligent encryption-enabled and tamper-resistant fingerprint devices to more effectively address these challenges.

Trend #5: Security policies and best practices will become as important as technology advances: The industry will sharpen its focus on not only what to deploy, but how – from the first U.S. mobile driver licenses to unified credential management systems that enable organizations to more holistically address both facility and information security. Rather than focus exclusively on preventing breaches, the industry will also adopt best practices for controlling what happens afterwards, so stolen identities are useless to thieves.

Mid-year update: Through mid-year, the world moved closer to deploying driver licenses on mobile phones, while two key policy issues emerged through mid-year: protecting privacy by using a smartphone’s Bluetooth connection so users needn’t physically relinquish their smartphones to officers and officials, and ensuring citizens can control what data is made available to others. Beyond citizen ID, general security best practices and policies remain important for virtually any organization, and demand grew for HID Global services that help customers deploy innovative solutions to meet compliance, security and risk management needs, while enabling new, value-added capabilities.

Latest

More like this
Related

Infosys settles U.S. cyber incident lawsuits for $17.5 mn

Indian IT services giant Infosys has reached a settlement...

India’s Ministry of Housing reveals AWS bucket with 2 mn sensitive data

Cybernews research team has discovered an exposed AWS bucket...

SentinelOne struggles to translate AI innovation into revenue growth

Despite SentinelOne’s strong focus on AI-driven cybersecurity solutions, its...

Who’s Dark Storm, the group behind DDoS attack on X (formerly Twitter)?

Dark Storm Team has claimed responsibility for a major...