Summary is AI-generated, newsdesk-reviewed
  • IoT adoption boosts demand for identity solutions enhancing security and user experience.
  • Cloud platforms improve scalability, enabling advanced analytics and AI in security environments.
  • GDPR compliance and privacy protection become focal points amid escalating security threats.

This time last year, we predicted 2017 would be the year digital identities began transforming trusted access and other interactions in physical and online environments.

Continuous Authentication Experience

Demand grew for unified identity and access management systems supporting both cards and cellphone devices. Trusted identities began bridging the gap between connected workers and smart buildings. We saw new IoT use cases that employ location services technologies to create a continuous authentication experience that is invisible to the user.

There was growing emphasis on combining on-premises solutions and the cloud to create identity-aware environments. Trusted identities were embedded more deeply in everyday activities, and biometrics improved the user experience.

The strengthening economy in 2017 was reflected through growing interest in our product offerings – both through R&D and strategic acquisitions. High-profile breaches continued to expose our customers’ infrastructure vulnerabilities and their need to upgrade from older technologies to our latest solutions. Increased IoT adoption provided new reasons to invest in trusted identity solutions that improve security while creating a better user experience.Cloud-based platforms simplify upgrades while improving identity solutions scalability and deliverability

The Cloud, Analytics and AI Capabilities

Looking ahead to 2018, we anticipate a more people-centric view of security for today’s more dynamic workforce. There also is the growing need to secure IoT end-devices with digital certificates that add trust to everything, from printers for remotely provisioning employee ID cards, to asset-tracking systems that predict and pre-empt equipment failures while optimising supply-chain efficiency.

Cloud-based platforms will simplify upgrades while improving how identity solutions are delivered and scaled. They will also drive more advanced data analytics that will lead to an array of artificial intelligence capabilities in connected, more intelligent environments. Escalating security threats will reinforce the need to combat identity and data theft while protecting privacy, and there will be an increased focus on complying with Europe’s General Data Protection Regulation (GDPR).

The Year To Come

2017 was a successful year for HID Global as we served growing demand for our award-winning products that power the trusted identities of people, places and things. Digitization, connectivity and cloud adoption trends will drive new recurring revenue opportunities through 2018 and beyond, and we will work with our partners to help organizations create trusted environments where employees, customers, contractors and visitors can securely interact with their workplace in new, more convenient and appealing ways.

Discover how AI, biometrics, and analytics are transforming casino security

  • Related companies
  • HID
  • View all news from
  • HID

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...