HID - Experts & Thought Leaders

Latest HID news & announcements

HID Helps In Automating The Access Control Management At Żabka

Enhancing enterprise security is high on the list of priorities for businesses across sectors. Within the retail industry, there is an additional focus on enabling new ways of working through management tools. Integrated solutions and applications help to create a robust security landscape and ensure a future-ready posture as organizations look to address emerging risks and create better experiences for next-gen employees. Physical access control (i.e., the readers on the door and the credentials that individuals present to them for authentication) is not only one of the first interactions employees have with security technology but is also the first line of defense in security programs. Good user experience The balance of a good user experience and strong security is critical, though striking that balance has been a challenge historically as security teams are tasked with prioritizing safety and protection. Innovative companies who want to go beyond traditional access control have found the balance of a frictionless user experience and strong security in mobile access solutions. Żabka is one of the largest European retail companies with 7000 locations across Poland Żabka is one of the largest European retail companies with 7000 locations across Poland and the Czech Republic. Innovation is in its DNA and the organization is known as an early adopter. From introducing AI to create an autonomous and checkout-free shopping experience to launching a cloud-based platform to better the franchise management process, Żabka has actively embraced continuous change and improvement. When implementing security for its new headquarters in Poznań, Poland, Żabka returned to its pioneering roots, requiring a highly secure, automated solution that enabled the integration of custom applications and simplified the use of other building-wide office functionalities. Physical security components Żabka’s vision included seamless access starting at building entrances with employees using their mobile phones to ‘badge’ into the building. From there, the same mobile credential would unlock turnstiles, authenticate floor access in elevators, track time and attendance and release documents at shared printers. Most importantly, user data would need to be secured via encryption and authentication through appropriate access keys with the introduction of new users being completely under Żabka’s control. The implementation of an ecosystem with multiple capabilities — including a migration from plastic cards to mobile identities, surveillance tools, access management, and physical security components to underpin the entire solution — also necessitated collaboration between partners who shared Żabka’s spirit of modernization and vision for a seamless user experience. Traditional plastic credentials Żabka’s comprehensive ecosystem utilizes digital access control processes The project team included HID Global who managed the transition from traditional plastic credentials to mobile identities, with Zonifero to develop a custom mobile app, and Cynergy to complete the installation of hardware and embedded components. Żabka’s comprehensive ecosystem utilizes digital access control processes and integrated surveillance tools with a security management platform enabling Żabka to migrate completely to the use of mobile identities. The move to HID Mobile Access has changed the experience of employees, visitors, HR, and security administrators by accelerating and automating access control management for the entire building. Integrated surveillance tools Mobile identities, contactless employee onboarding, touchless visitor management, time and attendance, and integration with the security system of the entire building are now aggregated and facilitated within the smartphone app. Security administrators remotely managed a pool of allocated mobile identities The ability to manage the access control system from anywhere with no physical contact was especially valuable. Launched amid the pandemic, the new infrastructure enabled Żabka employees to maintain social distancing and limit contact through automatic and remote activation of access. Security administrators remotely managed a pool of allocated mobile identities and individual access to users’ devices, thereby solving the problem of storing physical cards, facilitating credential transfers, issuing new credentials in the case of lost or damaged ones, and deactivating cards in the event they were lost or stolen. Mobile identity functionalities Żabka implemented mobile access on a large scale with mobile IDs in use by about 800 employees. The retailer also plans to implement further mobile identity functionalities, such as opening parking lot gates, making cafeteria purchases, and seamlessly logging in to computers. Steve is responsible for leading and coordinating demand generation programs and channel marketing activities for HID's Physical Access Control Solutions (PACS) business area in Europe. He has over 20 years of experience working in B2B marketing, 15 of which have been in the safety and security industries.

HID Achieves TX-RAMP For PKIaaS Security Solution

HID, a pioneer in trusted identity solutions, has achieved Texas Risk and Authorization Management Program (TX-RAMP) certification for its Public Key Infrastructure as a Service (PKIaaS) solution. This certification demonstrates HID’s commitment to cybersecurity excellence and enables Texas state and local government to confidently engage with approved, trusted providers to procure secure, cloud-based certificate lifecycle management services with faster timelines and reduced administrative burden. TX-RAMP certification The TX-RAMP certification validates that HID PKIaaS meets the State of Texas' strict rigorous cybersecurity standards for handling sensitive government data, helping to eliminate the need for individual agencies to conduct their own lengthy security assessments. This approval removes procurement barriers for Texas agencies, municipalities, school districts and other public sector entities seeking to modernize and protect their digital identity infrastructure with automated, cloud-based certificate management. Why compliant certificate management matters Digital certificates are the foundation of secure communication on the Internet, enabling TLS/SSL encryption that protects websites, online transactions and sensitive data. However, managing these protocols manually is challenging, as an expired certificate can cause outages, expose vulnerabilities, and ultimately lead to financial loss and damaged public trust. HID’s PKIaaS solution automates digital certificate management (issuance, renewal and revocation), ensuring continuous compliance and uptime, while maintaining the robust security controls required by government entities handling citizens’ sensitive data. As a globally trusted Certificate Authority, HID also enables seamless automated management of IdenTrust certificates within PKIaaS. Certificates from a globally trusted authority provide instant trust and interoperability across major platforms and devices, simplifying the experience for users.

HID Appoints Jos Beernink As VP For PACS In Europe

HID, a worldwide pioneer in trusted identity solutions, announced the appointment of Jos Beernink as Vice President Europe for its Physical Access Control (PACS) business. In this role, Beernink will lead HID’s strategy, sales and operations across the whole European region, helping organizations leverage trusted identity and access control technologies to create a secure, smarter and more efficient workplace and physical spaces. Prior roles of Beernink  Beernink brings more than 25 years of international leadership experience in the technology and security industries to HID. His career spans sales, go-to-market and general management roles at companies including Atari, Tech Data, Samsung Electronics, Honeywell Security & Fire, Genetec and Milestone Systems (part of Canon Group). “HID is the pioneer in secure identity and access solutions, with products and technologies that touch almost every part of modern life,” said Beernink. “It’s inspiring to join a company that combines such strong innovation with a clear, forward-looking vision. HID’s scale, expertise and technology make it uniquely positioned to help customers navigate the digital transformation of access control - from mobile and cloud-connected systems to the next generation biometric authentication methods.” Educational background of Beernink  Since joining HID, Beernink has been focused on strengthening HID’s European presence through closer alignment with channel partners, increased support for enterprise end-users, expansion of HID’s sales and engineering teams and continued investment in strategic growth verticals including data centers, critical infrastructure, healthcare, government and smart buildings. Beernink holds a business degree in Commercial Economics, studied Business Administration in the Netherlands, and has completed executive programs at Harvard Business School, INSEAD, and Nyenrode University, where he published a paper on strengthening boardroom preparedness for cyber risks. European leadership team Outside of work, Beernink is a licensed private pilot, dedicated runner and an active board member of his local Lions International chapter, combining his enthusiasm for technology, travel and community service. “Jos brings a wealth of experience and a truly international perspective to our European leadership team,” said Gerald Grattoni, HID’s Vice President & Head of Mature Markets. “His deep understanding of the security landscape, coupled with a strong customer-first mindset, will be instrumental in driving our continued growth and innovation across the region.”

Insights & Opinions from thought leaders at HID

ISC West 2019 Day Two: Explaining The New And The Tried-And-True

There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm Biometrics Integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative Security Technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud?  PowerSeries Pro Intrusion Portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping To Cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalize on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight Hosted Managed Service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarize system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.

How Should Security Adapt To The Unique Aspects Of Healthcare?

The healthcare industry faces unique and significant security challenges. Healthcare security professionals must balance an open, welcoming environment for patients and visitors with the need to protect valuable assets and personnel in a high-stress, 24/7 setting. These requirements direct the physical security technologies deployed in medical facilities. We asked our Expert Panel Roundtable: What are the unique aspects of the healthcare market, and how should the physical security industry adapt?

How Are Security Systems Transitioning From Reactive To Proactive?

Emphasizing proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?