2016 Trends

Trend 1: “Mobilizing” security will make it more pervasive and personalized.
As we do more with our phones and increasingly demand anywhere/anytime on-line access, there is the opportunity to better protect these activities while creating a more satisfying, mobile-centric security experience at home, in the office, on the road and on-line.  Over the past several years we’ve begun to turned phones into ID cards, keys and computer logon tokens while plugging security holes that mobility had initially introduced. Moving forward, continuing advancements will enable a new, more secure identity lifestyle built around the convenience and ubiquity of our ever-present mobile devices:

  • Improvements in deployment, onboarding, management and professional service options will help accelerate mobile access adoption, increasing user confidence and capabilities across a growing range of applications. 
  • It will become even easier for travelers to open hotel doors, for college students to enter dorm rooms, and for on-line bank customers to transact with their phones. 
  • Computer and network logon will move even more seamlessly to phones, tablets and laptops. 
  • Visiting healthcare workers, patrolling guards, field inspection teams and factory workers will touch their phones to RFID tags to log their presence and securely monitor processes in the Internet of Things (IoT). 
  • Wearables and other mobile products will join the device ecosystem, giving users even more choices and flexibility.

Trend 2:  Security will move to a much greater focus on the user experience.
Users will continue to be the most important elements and yet weakest links in any security strategy, putting themselves and the people they work and transact with at risk when they don’t do their part.  Advancements in the security experience will play a vital role in closing this gap between security planning and user compliance.  

  • Security technology will no longer define office habits and personal lifestyles but adapt to them while empowering new capabilities, making it easier – and even attractive -- for users to comply with requirements.
  • Users will have more options for presenting secure identities for authentication.  Organizations are now interested having the choice to use any combination of ID cards, phones or other mobile device, or biometric factor such as a fingerprint.  The coming years will bring even more options.
  • Traditional authentication elements like passwords, challenge/response questions and logon tokens will disappear, to be replaced by better ways of securing mobile banking channels, authenticating to corporate data, apps and web services, and accessing healthcare and other sensitive personal information. 

Trend 3:  A new era of secure connected identities will not only make us safer but fuel innovation in how we work, shop and play.
After two decades of advances from simple visual ID badges to smart cards, standards-based access control systems and mobile ID solutions, the industry will now enter its next new chapter:  connected identities for a connected world that are used on a variety of devices for a growing range of existing and new applications. 

  • There will be greater reliance on many digital versions of our identity, used in many different ways across all walks of life. 
  • We will connect our identities to an expanding solution ecosystem for secure access to doors, data and cloud-based services and applications, accelerating the need for unified identity management systems and processes.
  • The more we use these connected identities to secure so many aspects of our lives, the more it will fuel innovation in everything from the way we bank and purchase items to how our businesses, hospitals, schools, manufacturing plants and other facilities are built and operated.
  • Multi-layered security strategies will be critical for protecting these connected identities, and biometrics will offer the potential to eliminate digital identity theft, binding all of these many different digital credentials to their true owners while making security even more convenient.

Trend 4:  There will be closer attention to privacy issues in an increasingly connected and mobile-first world.

  • A growing category of business and consumer products and services will be steadily collecting information about users, creating privacy and security vulnerabilities not only in cyberspace but in the physical world as well. 
  • The IoT will put even greater pressure on privacy.  In a world where everything is connected – objects with other objects, the IoT with other networks -- everything is potentially at risk.   And as the IoT evolves, identity will expand beyond people and their personal identity information to the identity of objects and their authenticity.
  • Protecting personal information will become a critical focus area in the design, deployment and lifecycle of each and every interconnected device, service and application. 

Trend 5:  Security policies and deployment best practices will be as important as technology advancements.

  • More organizations will realize even the most advanced technology is only as secure as the policies and deployment best practices that support them. 
  • The first U.S. digital driver licenses will showcase this challenge, highlighting policy considerations that must accompany the use of secure, authenticated digital identities on mobile devices for issuing, carrying and presenting these and other government credentials.
  • Cost barriers that previously impeded best practices will be overcome as the value of these investments increases.  For example, organizations are more likely to deploy physical access control systems if the same solution for opening doors can also be used for cafeteria purchases, computer logon, time-and-attendance systems and other applications.
  • Vulnerability holes will be plugged as organizations move beyond older technologies to the latest solutions while also adopting best practices for policy and deployment.

This article originally appeared in the January 2016 issue of Security Today.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3