CTO of HID Global Shares Projections for Top Secure Identity Trends of 2013

HID Global, a source for secure identity solutions, today released its projections for the top secure identity trends of 2013. The predictions span a broad range of market segments, including physical access control, logical access control, and mobile access control using NFC-enabled smartphones.  Other market segments covered in the company’s projections include visitor management, secure credential issuance, and RFID tagging for traditional asset tracking applications as well as new uses, such as product and document certification and authentication.

“As a company that provides the industry’s broadest range of secure identity products, solutions and services, HID Global offers a unique perspective on the factors driving key industry developments and the adoption of new technologies,” said Selva Selvaratnam, senior vice president and chief technology officer with HID Global. “We believe that 2013 will be a watershed year for the secure identity industry due to important advances in technology that will drive increased security and an unprecedented user experience across both existing and new markets.”

From HID Global’s perspective, the trends unfolding during 2013 that will impact market direction and influence how organizations will create and use manage secure identities include:

    • Users want to move toward a more “frictionless” security experience. 

    • Mobile access control will accelerate and dramatically change the industry.

    • NFC-enabled smartphones will still co-exist with cards for opening doors and other applications. 

    • Access control will continue to converge on cards and NFC-enabled mobile devices.

    • The industry will accelerate its migration from magstripe to prox to smarter smart cards. 

    • Identity management will move to the cloud, supported by new managed services.

    • Secure issuance advancements will make it easier to create and distribute more secure cards. 

    • A new category of trusted NFC tags will change how we secure assets and protect consumers.

    • Highly-secure, FIPS-201 technology will move beyond the government to commercial     applications. 

    • Access control systems will increasingly feature integrated visitor management capabilities.

HID Global anticipates that these, and other trends in IP-based access control, will drive new capabilities in 2013 while shaping the market in the years to come.

Detailed descriptions of the company’s top ten anticipated 2013 trends can be found in a two-part series on HID Global’s blog.

Featured

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.