Wed, Mar 29 2017, 2:48 pm

Tech trends in identity technology industry in 2017

By Digital Edge Bureau, 13.01.2017, 12:05
 
HID_Stefan_Widing_1

Stefan Widing, HID Global’s CEO & President

HID Global focuses on four significant trends in 2017 that will influence how organizations create, manage and use trusted identities in a broad range of existing and new use cases.

Stronger adoption of mobile devices and advanced smart cards underscores the need for trusted identities

Similar to the adoption of consumer trends to IT in past years, 2017 will also see furtherconsumerization of security, with heightened demand from users seeking to open doors, and login to cloud-based resources, as well as have personalized on-demand printing of documents, and to deploy printed credentials remotely or conduct other transactions and daily activities using trusted IDs on their phone, wearable or smart card.

Trusted IDs that integrate security, privacy and convenience will provide a new level of assurance to these applications and transactions, while being uniquely positioned to make secure access more personalized to the individual. 

The industry will look towards complete identity relationship management that considers the need to grant access based on the context or circumstances for risk-appropriate authentication across trusted identities assigned to people, devices, data and things in smart offices, buildings and other environments that are becoming more connected every day.    

Greater emphasis on the cloud through “hybrid” solutions that combine on-premises and the cloud to create common management platforms for digital IDs

Organizations are recognizing the interdependencies of technologies and platforms needed for business agility, cost management and providing a better user experience within a mobile workforce, or for digital commerce and relationship management that continues to require more reach, flexibility, security.

In banking, government, healthcare and other regulated markets, multi-factor authentication for physical and IT access control will have more opportunities to merge into integrated systems that will also provide a more convenient experience for users and increase security. 

This model will make it easier for administrators to deploy and maintain an integrated system throughout the complete identity lifecycle — from onboarding to offboarding;

It will make it possible to monitorandmanage employees’ access rights as their role changes within an organization, ensuring employees only have access to what they need in a current role.

Credential issuance for physical ID cards will also experience a digital transformation, as the use of cloud technologies will enable managed service models for badge printing and encoding.

Emerging IoT uses cases to connect, more people, places and things, increasing the need to ensure the Internet of Trusted Things (IoTT)

Trusted identities will increasingly be employed to help secure, customize and enhance the user experience across a growing range of industry segments that are embracing the power of the IoT. 

Organizations will look towards streamlining processes and operations using real-time location systems, presence- and proximity-based location functionality, condition monitoring solutions, beacons and cloud-based models foremerging IoT applications using Bluetooth Low Energy. These applications will include a growing number of energy efficient, productivity and safety-oriented use cases that will need to know the identity of occupants in a physical space to manage environmental conditions, book meeting rooms and auto-configure audio visual equipment and alarms.

Bluetooth Low Energy-based solutions will also advance existing secure proof of presence capabilities to include the predictive analytics and functionality based on location-based technologies.

Embedding trusted identities more deeply in everyday activities for businesses and consumers

Trusted identities will become an embedded feature of more use cases rather than simply an add-on capability. This trend of “security by design” will lead to many more convenient approaches to using digital identities across a growing variety of activities, services and industries. 

Along with popular secure access use cases, new applications will emerge, such as employee mustering capabilities to address emergencies as well as the need to more accurately determine who is in a building in real-time.

New capabilities for managing and using trusted IDs will be driven by the increase of temporary offices, mobile knowledge workers and the evolution of the workplace, where adapting to the preferences of today’s talent pool is driving the need for more open, flexible workspaces.  Consumers also will begin seeing trusted identities used in many everyday scenarios, such as guaranteeing authorized use of corporate and heavy machinery fleets, as well as creating new ways to safeguard students and validate drivers.  
                                                                                                                                                                            By HID Global’s CEO & President, Stefan Widing

 

0 comments

Add your comment

Nickname:
E-mail:
Website:
Comment:


+ 8 = seventeen

Other articlesgo to homepage

Pebble appoints Ingram Micro as its national distributor

Pebble appoints Ingram Micro as its national distributor(0)

Pebble, a well-known power banks and branded mobile accessories provider, has partnered with Ingram Micro as its national distributor for addressing the Indian market. The partnership will give a further boost to Pebble’s existing market presence over 18 states in India. Through the partnership with Ingram Micro as its national distributor, Pebble has started Pan-India

Dell EMC helps firms run and manage fleets of PCs well

Dell EMC helps firms run and manage fleets of PCs well(0)

In an interesting move, Dell EMC comes out with a new tech regime for deploying,  managing and up-keeping of large scale deployments of PCs in firms and organizations. Quite often PCs feel neglected post-deployments in matters of maintenance, management and up-keeping of theirs. Towards bringing caring ecosystems around PCs, Dell EMC has introduced ‘ProDeploy Client

Informatica partners with Ingram Micro cloud for India

Informatica partners with Ingram Micro cloud for India(0)

For addressing the burgeoning Indian IT infrastructure market, Informatica, one of world’s leading data management solutions providers, has struck a distribution agreement with Ingram Micro, which also specializes in selling cloud-based software applications to firms and organizations the world over including India. Through this relationship, Infomatica’s suite of cloud data management products will be available

Five innovations that will change people’s lives in 5 years

Five innovations that will change people’s lives in 5 years(0)

IBM has come out with the annual ‘IBM 5 in 5’– a list of ground-breaking scientific innovations with the ‘potential to change the way people work, live, and interact during the next five years. These include—artificial intelligence (AI); Hyperimaging; Macroscopes; Medical labs ‘on a chip’; and Smart sensors. In 1609, Galileo invented the telescope and

Fitbit brings in redesigned and personalized trainer app

Fitbit brings in redesigned and personalized trainer app(0)

For health conscious people, Fitstar has brought in further sophisticated personal trainer app for continuing on well-informed workout journey. The new Fitstar Personal Trainer app features tailored workouts and recommendations based on Fitstar and Fitbit activities. More robust guidance and coaching will help work out smarter and get the most out of the Fitbit ecosystem.

read more
banner

Contacts and information

New Delhi (India)

Social networks

Most popular categories