Story image

Demand for secure identity solutions grows

19 Jan 16

Creating and maintaining a secure identity will become a key consideration for consumers in 2016, according to HID Global, a worldwide provider of secure identity solutions.

Various trends, including ongoing advancements in privacy protection, a broader adoption of best practices for solution deployment, and a more mobile and connected experience will have a big impact on secure identity solutions, according to HID.

“We’re watching several developing trends in the new year, including growing demand for a more mobile-centric and satisfying user experience that HID Global believes will be the primary driver for security technology innovation in 2016,” says Stefan Widing, HID global president and CEO. 

“Customers will increasingly aspire to a comprehensive secure identity experience for their users that can provide the foundation for more flexible, adaptable solutions in a new era of interconnected digital identities and the Internet of Things,” he says.

‘Mobilising’ security will make it more pervasive and personalised 

A new, more secure identity driven lifestyle will be built around the convenience of ever-present mobile devices, according to HID.

Computer and network logon, driver licences and other applications will more seamlessly join physical security functions on phones, tablets and laptops.

Wearables will be the next step, and phones will also work with RFID tags to add security and trust to the IoT for proof-of-presence applications, says HID.

Security will move to a much greater focus on the user experience 

This will help close the gap between planning and compliance, while ensuring that security adapts to rather than defines end-user habits and lifestyles. Old ways of authenticating will be replaced by more satisfying alternatives, HID says.

 Secure, connected identities will fuel safety and innovation in how we work, shop and play

The industry will enter its next new chapter of connected identities, employing multi-layered security strategies that also include biometrics in order to bind these identities to their legitimate owners, according to HID.

There will be more attention on privacy in an increasingly connected and mobile-first world 

Identity will expand beyond people and their personal identity to the identity of objects and their authenticity, accentuating the need to protect personal information across increasingly interconnected devices, services and applications, says HID.

Security policies and best practices will become as important as technology advances

The industry will sharpen its focus on not only what to deploy, but how – from the first mobile driver licences to unified credential management systems that enable organisations to more holistically address both facility and information security, HID says.

Rather than focus exclusively on preventing breaches, the industry will also adopt best practices for controlling what happens afterwards, so stolen identities are useless to thieves, according to HID.

SonicWall secures hybrid clouds by simplifying firewall deployment
Once new products are brought online in remote locations, administrators can manage local and distributed networks.
What MSPs can learn from Datto’s Channel Ransomware Report
While there have been less high profile attacks making the headlines, the frequency of attacks is, in fact, increasing.
Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
Kiwis losing $24.7mil to scam calls every year
The losses are almost five times higher compared to the same period last year, from reported losses alone.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why Australian enterprises are prime targets for malware attacks
"Only 14% of Australian organisations are continuously training employees to spot cyber attacks."
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”