02.02.2016 Views

GSN January 2016 Digital Edition

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Access Control<br />

HID Global looks ahead at top trends for<br />

secure identity in <strong>2016</strong><br />

AUSTIN, Texas, <strong>January</strong> 13, <strong>2016</strong> –<br />

HID Global®, a worldwide leader in<br />

secure identity solutions, has identified<br />

security <strong>2016</strong> trends to watch<br />

based on its deep insights gained<br />

from top customers across numerous<br />

markets, along with pilots and<br />

deployments of the company’s latest<br />

solutions with forward-looking<br />

partners and end-user organizations<br />

worldwide. HID Global’s broad industry<br />

perspective has positioned<br />

the company to pinpoint five key<br />

developments that it believes will<br />

have the greatest impact during this<br />

year on identity and access management,<br />

citizen identification and the<br />

Internet of Things (IoT).<br />

“We’re watching several developing<br />

trends in the new year, including<br />

growing demand for a more<br />

mobile-centric and satisfying user<br />

experience that HID Global believes<br />

will be the primary driver for security<br />

technology innovation in <strong>2016</strong>,”<br />

said Stefan Widing, HID Global<br />

President and CEO. “Customers<br />

will increasingly aspire to a comprehensive<br />

secure identity experience<br />

for their users that can provide the<br />

foundation for more flexible, adaptable<br />

solutions in a new era of interconnected<br />

digital identities and the<br />

Internet of Things.”<br />

HID Global’s <strong>2016</strong> trends point<br />

to a more mobile and connected<br />

experience, ongoing advancements<br />

in privacy protection and broader<br />

adoption of best practices for solution<br />

deployment. The trends include:<br />

<br />

will make it more pervasive and<br />

a new, more secure<br />

identity lifestyle will be built around<br />

the convenience of ever-present<br />

mobile devices. Computer and<br />

network logon, driver licenses and<br />

other applications will more seamlessly<br />

join physical security functions<br />

on phones, tablets and laptops.<br />

Wearables will be the next step, and<br />

phones will also work with RFID<br />

tags to add security and trust to the<br />

IoT for proof-of-presence applications.<br />

23<br />

<br />

a much greater focus on the user<br />

This will help close the<br />

gap between planning and compliance,<br />

while ensuring that security<br />

adapts to rather than defines enduser<br />

habits and lifestyles. Old ways<br />

of authenticating will be replaced by<br />

more satisfying alternatives.<br />

<br />

identities will fuel safety and innovation<br />

in how we work, shop and<br />

The industry will enter its next<br />

new chapter of connected identities,<br />

employing multi-layered security<br />

strategies that also include biometrics<br />

in order to bind these identities<br />

to their legitimate owners.<br />

tention<br />

on privacy in an increasingly<br />

connected and mobile-first<br />

Identity will expand beyond<br />

More on page 36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!