GSN January 2016 Digital Edition
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Access Control<br />
HID Global looks ahead at top trends for<br />
secure identity in <strong>2016</strong><br />
AUSTIN, Texas, <strong>January</strong> 13, <strong>2016</strong> –<br />
HID Global®, a worldwide leader in<br />
secure identity solutions, has identified<br />
security <strong>2016</strong> trends to watch<br />
based on its deep insights gained<br />
from top customers across numerous<br />
markets, along with pilots and<br />
deployments of the company’s latest<br />
solutions with forward-looking<br />
partners and end-user organizations<br />
worldwide. HID Global’s broad industry<br />
perspective has positioned<br />
the company to pinpoint five key<br />
developments that it believes will<br />
have the greatest impact during this<br />
year on identity and access management,<br />
citizen identification and the<br />
Internet of Things (IoT).<br />
“We’re watching several developing<br />
trends in the new year, including<br />
growing demand for a more<br />
mobile-centric and satisfying user<br />
experience that HID Global believes<br />
will be the primary driver for security<br />
technology innovation in <strong>2016</strong>,”<br />
said Stefan Widing, HID Global<br />
President and CEO. “Customers<br />
will increasingly aspire to a comprehensive<br />
secure identity experience<br />
for their users that can provide the<br />
foundation for more flexible, adaptable<br />
solutions in a new era of interconnected<br />
digital identities and the<br />
Internet of Things.”<br />
HID Global’s <strong>2016</strong> trends point<br />
to a more mobile and connected<br />
experience, ongoing advancements<br />
in privacy protection and broader<br />
adoption of best practices for solution<br />
deployment. The trends include:<br />
<br />
will make it more pervasive and<br />
a new, more secure<br />
identity lifestyle will be built around<br />
the convenience of ever-present<br />
mobile devices. Computer and<br />
network logon, driver licenses and<br />
other applications will more seamlessly<br />
join physical security functions<br />
on phones, tablets and laptops.<br />
Wearables will be the next step, and<br />
phones will also work with RFID<br />
tags to add security and trust to the<br />
IoT for proof-of-presence applications.<br />
23<br />
<br />
a much greater focus on the user<br />
This will help close the<br />
gap between planning and compliance,<br />
while ensuring that security<br />
adapts to rather than defines enduser<br />
habits and lifestyles. Old ways<br />
of authenticating will be replaced by<br />
more satisfying alternatives.<br />
<br />
identities will fuel safety and innovation<br />
in how we work, shop and<br />
The industry will enter its next<br />
new chapter of connected identities,<br />
employing multi-layered security<br />
strategies that also include biometrics<br />
in order to bind these identities<br />
to their legitimate owners.<br />
tention<br />
on privacy in an increasingly<br />
connected and mobile-first<br />
Identity will expand beyond<br />
More on page 36