You are here: Home » ANALYSIS » Security Identity Trends for 2014

Security Identity Trends for 2014

Security Identity Trends for 2014

Security Identity Trends for 2014

As the New Year starts, several security trends are moving in the industry which will have the greatest impact on the secure identity industry in 2014. The security professionals are on the lookout for some key trends in identity and access management.

The predictions encompass a diverse range of solutions and technologies, including anticipated advances in physical and logical access control, secure issuance, identity assurance, visitor management, electronic ID (eID) and secure asset tracking.

HID Global’s Selva Selvaratnam also anticipates a decline in the use of passwords for securing resources as organizations extend strong authentication across their IT infrastructure and out to the door. This can also accelerate the convergence of physical and logical access control that will drive a more seamless user experience when securing doors, data and the cloud.

Some of the trends that will roll down in 2014:

Hardware elements in mobile devices will become important part of IAM. Rapid upgrading of mobile devices will make hardware based security technologies widespread in short order. Those systems will help solve some of the challenges that bring your own device policies must address.

Lack of scalable identity proofing will continue to vex broader deployments. There are challenges on validating online identities in an accurate and scalable manner. As more and more users enroll in online services, demand for identity proofing services will increase significantly, but organizations will continue to experience identity proofing challenges. While the sources for identity proofing data will continue to expand with the digitization and exposure of new public and private records, this continued demand for identity proofing in 2014 will force the industry to collaborate and partner more closely to deliver scalable identity proofing to meet these needs.

The industry is quickly moving beyond static, proprietary access control architectures to more secure, open and adaptable solutions, supporting the customers’ desire for new products and technologies that enable their business.

Integrating physical access control with IT security will bring new benefits while changing how organizations operate.

Successful marketing depends on understanding customers’ needs and providing them with a convenient experience for registration and enrollment. Allowing social login and maintaining a corporate presence on social networks provides an opportunity to capture valuable customer data, including user identities, social interaction patterns, and browsing and buying tendencies. The CMO will press for these capabilities to help the enterprise engage with its customers, develop a stronger relationship with them, and improve loyalty. Identity management infrastructures that support these marketing initiatives will experience improved demand as “business enablement” gains wider recognition as a critical driver of IAM.

Strong authentication will continue to grow in importance in the face of a rapidly changing IT security threat environment – and will also move to the door and include other factors such as biometrics and gestures.

Strong authentication will increasingly be implemented using a multi-layered security strategy.

Mobile access control will continue to roll out in stages and use various wireless technologies.

We will enter a new era of NFC authentication services, using trusted tags to establish unique identities for many items in many public places, and to later verify their authenticity using contactless readers or any NFC-enabled smartphone or tablet.

The migration of intelligence to the door will continue with the further adoption of IP architectures and future capabilities of smartphones for access control.

Printing and encoding advancements will simplify card personalization. The market will increasingly see faster printing and encoding solutions, more durable card materials, and solutions that enable “anywhere/anytime” distributed issuance capabilities.

Visitor management systems will continue to move beyond the businesses to schools, hospitals and other institutions where high-profile incidents have proven that safety and security shouldn’t be left to paper logs.

There will be accelerating worldwide adoption of multi-purpose electronic ID (eID) credentials.

By HID Global

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

About Kalpana Singhal

Kalpana Singhal is Co-Founder & Editor in Chief at Techplus Media. She is an Innovative & challenger Entrepreneur who started her journey from corporate communication in early 2001 with I.T. Industry followed by Lead - Editorial at BeautyIndia.in in 2008 . You can follow her on twitter, Google+ and Facebook.

Leave a Reply

Your email address will not be published. Required fields are marked *


You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>