HID Global Gives Security Trends to Watch in 2016
A move to mobile, secure and connected security solutions is in HID Global’s forecast.
HID Global has identified security 2016 trends to watch based on its deep insights gained from top customers across numerous markets, along with pilots and deployments of the company’s latest solutions with partners and end-user organizations worldwide.
“We’re watching several developing trends in the new year, including growing demand for a more mobile-centric and satisfying user experience that HID Global believes will be the primary driver for security technology innovation in 2016,” said Stefan Widing, HID Global president and CEO. “Customers will increasingly aspire to a comprehensive secure identity experience for their users that can provide the foundation for more flexible, adaptable solutions in a new era of interconnected digital identities and the Internet of Things.”
HID Global’s 2016 trends point to a more mobile and connected experience, ongoing advancements in privacy protection and a broader adoption of best practices for solution deployment. The trends include:
1. “Mobilizing” security will make it more pervasive and personalized. A new, more secure identity lifestyle will be built around the convenience of ever-present mobile devices. Computer and network logon, driver’s licenses and other applications will more seamlessly join physical security functions on phones, tablets and laptops. Wearables will be the next step, and phones will also work with RFID tags to add security and trust to the IoT for proof-of-presence applications.
2. Security will move to a much greater focus on the user experience. This will help close the gap between planning and compliance, while ensuring that security adapts to rather than defines end-user habits and lifestyles. Old ways of authenticating will be replaced by more satisfying alternatives.
3. Secure, connected identities will fuel safety and innovation in how we work, shop and play. The industry will enter its next new chapter of connected identities, employing multi-layered security strategies that also include biometrics in order to bind these identities to their legitimate owners.
4. There will be more attention on privacy in an increasingly connected and mobile-first world. Identity will expand beyond people and their personal identity to the identity of objects and their authenticity, accentuating the need to protect personal information across increasingly interconnected devices, services and applications.
5. Security policies and best practices will become as important as technology advances. The industry will sharpen its focus on not only what to deploy, but how – from the first U.S. mobile driver’s licenses to unified credential management systems that enable organizations to more holistically address both facility and information security. Rather than focus exclusively on preventing breaches, the industry will also adopt best practices for controlling what happens afterwards, so stolen identities are useless to thieves.