Top Trends Impacting the Security Identity Industry in 2014

HID Global, a manufacturer of secure identity solutions, today released its projections for top trends the company believes will have the greatest impact on the secure identity industry in 2014. The predictions encompass a diverse range of solutions and technologies including anticipated advances in physical and logical access control, secure issuance, identity assurance, visitor management, electronic ID (eID) and secure asset tracking. HID Global’s Selva Selvaratnam also anticipates a decline in the use of passwords for securing resources as organizations extend strong authentication across their IT infrastructure and out to the door. This can also accelerate the convergence of physical and logical access control that will drive a more seamless user experience when securing doors, data and the cloud. 

“HID Global’s history of innovation, industry experience and broad view of the market through our partners and end user customers puts us in an ideal position to forecast developing solutions and technology trends,” said Selva Selvaratnam, senior vice president and chief technology officer with HID Global. “As a follow-up to last year’s predictions, we are now sharing the top trends we believe will shape the market during 2014 and beyond. These are exciting times, as the industry continues to make it even easier for organizations to improve security, adapt to evolving threats, and simplify the day-to-day work life for their users.”

Selvaratnam has identified the following trends to watch in 2014:

  • The industry is quickly moving beyond static, proprietary access control architectures to more secure, open and adaptable solutions, supporting the customers’ desire for new products and technologies that enable their business;
  • Integrating physical access control with IT security will bring new benefits while changing how organizations operate;
  • Strong authentication will continue to grow in importance in the face of a rapidly changing IT security threat environment – and will also move to the door and include other factors such as biometrics and gestures;
  • Strong authentication will increasingly be implemented using a multi-layered security strategy;
  • Mobile access control will continue to roll out in stages and use various wireless technologies;
  • We will enter a new era of NFC authentication services, using trusted tags to establish unique identities for many items in many public places and to later verify their authenticity using contactless readers or any NFC-enabled smartphone or tablet;
  • The migration of intelligence to the door will continue with the further adoption of IP architectures and future capabilities of smartphones for access control;
  • Printing and encoding advancements will simplify card personalization. The market will increasingly see faster printing and encoding solutions, more durable card materials, and solutions that enable “anywhere/anytime” distributed issuance capabilities;
  • Visitor management systems will continue to move beyond the businesses to schools, hospitals and other institutions where high-profile incidents have proven that safety and security shouldn’t be left to paper logs; and
  • There will be accelerating worldwide adoption of multi-purpose electronic ID (eID) credentials.

Featured

  • IoT Saves the Day

    IoT Saves the Day

    Today, creating a safe environment across schools, hotels, office buildings, housing complexes and other facilities has become a necessity. There are so many dangers lurking in buildings of all sizes and shapes from fire hazards, vaping issues, chemical/air quality issues, intruders and so much more. Read Now

  • Enhancing Situational Awareness

    Enhancing Situational Awareness

    In an era marked by technological advancements and increasing security concerns, the integration of artificial intelligence (AI) into video surveillance systems has revolutionized situational awareness and critical infrastructure protection. Read Now

  • Survey: Insider Threats Surge Across U.S. Critical Infrastructure

    Survey: Insider Threats Surge Across U.S. Critical Infrastructure

    Over three-quarters (77%) of organizations across US critical national infrastructure (CNI) have seen a rise in insider-driven cyber threats in the last three years, according to new research by leading cyber security services firm Bridewell. Read Now

  • The Impact of Strategic Technology Partnerships

    It may sound counterintuitive, but transparency is vital in the security industry. While many solutions block, divert and alert to imminent threats, at its core, security is rooted in the critical clarity between what the end-user needs and what the provider can offer Read Now

Featured Cybersecurity

New Products

  • Camden Door Controls ‘SER” Surface Boxes and Extension Rings

    Camden Door Controls ‘SER” Surface Boxes and Extension Rings

    Camden Door Controls has introduced new ‘SER” surface boxes and extension rings that provide a complete solution for new construction. In addition, they provide a simple and robust solution when replacing round wired and manual push plate switches with either Camden’s wired or wireless SureWave™ no-touch switches or Kinetic™ no-battery wireless switches. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • FlexPower® Global™ Series (FPG) from LifeSafety Power

    FlexPower® Global™ Series (FPG) from LifeSafety Power

    The FlexPower® Global™ Series (FPG) from LifeSafety Power—designed to provide DC power for access control systems in international applications—is now PSE listed for Japan and compatible with the country’s 100VAC applications. 3