Summary is AI-generated, newsdesk-reviewed
  • Access management shifts to mobile-first, personal, and pervasive security solutions.
  • HID Global strengthens digital identity with scalable, secure solutions for diverse markets.
  • Digital identities enable personalized, trusted access across physical and online environments.

After two decades of advances from simple visual ID badges to smart cards, standards-based access control systems and mobile ID solutions, the industry began entering its next new chapter in 2016.

We began “mobilizing” security to make it more pervasive and personalized, with a better user experience. We entered a new era of secure connected identities will not only make us safer but fuel innovation in how we work, shop and play. The industry began paying much closer attention to privacy issues in an increasingly connected and mobile-first world. And security policies and deployment best practices became as important as technology advancements.

HID Global Identity And Access Management

Against this backdrop, HID Global expanded its strong global position in identity and access management, while continuing to invest for the long term in a complete range of secure identity solutions, with an emphasis on unique offerings, a scalable ecosystem of security solutions, and a global partnering program.

Digital Identity Transformation

Digital identities are poised to
make trusted access and
other interactions in both the
physical and online
environments more personal,
contextual and valuable

HID Global believes that 2017 will be the year of the digital identity transformation. The secure use of digital identities continues to grow in popularity in their use beyond simple door-opening applications and plastic cards to the mobile-first world of phones and wearables. Now, digital identities are poised to make trusted access and other interactions in both the physical and online environments more personal, contextual and valuable, as everything comes together through unified identity and access management systems that are easier to deploy, manage and use.

Digital identities will help secure, customize and enhance the user experience across a growing range of industry segments and use cases. They will also connect people with things so that processes are streamlined and it is significantly easier for users to manage their world in ways they can trust, with security, convenience and privacy.

Partners And Customers

HID Global’s partners and end customers continued to deploy mobility solutions across a broad range of markets and innovative use cases, while HID introduced additional award-winning offerings, while also collaborating with our partners to solve customer challenges with solutions that make security more seamless, convenient and focused on improving the user experience. We also saw growing traction with our embedded solutions business as digital identity technology increasingly becomes and integral rather than add-on feature across a broad range of applications. 

See the full coverage of 2016/2017 Review and Forecast articles here

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Author profile

Brandon Arcement Director of Product Marketing, HID

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...