Story image

Demand for secure identity solutions grows

19 Jan 2016

Creating and maintaining a secure identity will become a key consideration for consumers in 2016, according to HID Global, a worldwide provider of secure identity solutions.

Various trends, including ongoing advancements in privacy protection, a broader adoption of best practices for solution deployment, and a more mobile and connected experience will have a big impact on secure identity solutions, according to HID.

“We’re watching several developing trends in the new year, including growing demand for a more mobile-centric and satisfying user experience that HID Global believes will be the primary driver for security technology innovation in 2016,” says Stefan Widing, HID global president and CEO. 

“Customers will increasingly aspire to a comprehensive secure identity experience for their users that can provide the foundation for more flexible, adaptable solutions in a new era of interconnected digital identities and the Internet of Things,” he says.

‘Mobilising’ security will make it more pervasive and personalised 

A new, more secure identity driven lifestyle will be built around the convenience of ever-present mobile devices, according to HID.

Computer and network logon, driver licences and other applications will more seamlessly join physical security functions on phones, tablets and laptops.

Wearables will be the next step, and phones will also work with RFID tags to add security and trust to the IoT for proof-of-presence applications, says HID.

Security will move to a much greater focus on the user experience 

This will help close the gap between planning and compliance, while ensuring that security adapts to rather than defines end-user habits and lifestyles. Old ways of authenticating will be replaced by more satisfying alternatives, HID says.

 Secure, connected identities will fuel safety and innovation in how we work, shop and play

The industry will enter its next new chapter of connected identities, employing multi-layered security strategies that also include biometrics in order to bind these identities to their legitimate owners, according to HID.

There will be more attention on privacy in an increasingly connected and mobile-first world 

Identity will expand beyond people and their personal identity to the identity of objects and their authenticity, accentuating the need to protect personal information across increasingly interconnected devices, services and applications, says HID.

Security policies and best practices will become as important as technology advances

The industry will sharpen its focus on not only what to deploy, but how – from the first mobile driver licences to unified credential management systems that enable organisations to more holistically address both facility and information security, HID says.

Rather than focus exclusively on preventing breaches, the industry will also adopt best practices for controlling what happens afterwards, so stolen identities are useless to thieves, according to HID.

Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.