Security industry enters new era driven by a shift in the use of trusted identities (part two)
Growing importance of trust and biometrics identity
The shift in the use of identity technology is also exposing the crucial difference between biometrics identity and ownership of a digital identity, pushing the industry to increase trust levels and combat fraud by better associating a user’s biometric ID with his or her digital identities.
The use of passwords or PINS to validate who is presenting a digital identity will become an increasingly unacceptable approach, as cybercriminals continue to assume and use digital identities across a growing number of transaction channels and access platforms. To solve this problem, the industry will look at biometrics as much more than simply a PIN or password replacement that makes it somewhat harder for cybercriminals to falsely assume someone else’s digital identity. Instead, biometrics will provide the most convenient and reliable way to associate digital identities exclusively with the true, biometrics identity of the person claiming to own them.
In applications that require the highest levels of trust and security, the industry will begin moving towards integrated solutions that use this biometrics-based identity-proofing process to create an unbroken chain of trust. Biometrics identity will be verified and bound to a digital identity at the time it is set up, and then verified again each time it is used.
Emerging IoT use cases
New ways to connect more people, places and things will drive the need to use trusted digital identities to ensure the Internet of Trusted Things. These identities will help to connect people with things to streamline processes and make it easier for users to manage their world. They will also increasingly be employed to help secure, customise and enhance the user experience across a growing range of industry segments that are embracing the power of the IoT.
Organisations will also look towards streamlining processes and operations using real-time location systems, presence- and proximity-based location functionality and condition-monitoring solutions. Cloud infrastructure, gateways, beacons and Software-as-a-Service models will emerge as a means of provisioning IoT solutions.
As a result, there will be a variety of new and emerging energy efficiency, productivity and safety-oriented applications in the enterprise that need to know the identity of occupants in a physical space. Bluetooth Low Energy (BLE)-based identity credentials will be an enabling technology in applications including heating, lighting and other environmental management, coordinating meeting room bookings, auto-configuring audio visual equipment, and facilitating emergency mustering and alarms so facilities can determine who is in the building in real time.
Preparing for the future
Organisations across a wide range of industries will increasingly pursue the goal of truly converged access control that ultimately consists of a single security policy, one credential, and one audit log, delivered through a fully interoperable, multi-layered security infrastructure that is based on a flexible and adaptable platform. Such a platform will enable facilities to preserve their investments as they grow, evolve, and continually improve their security capabilities in the face of ever-changing threats, while also simplifying deployment and management and lowering total cost of ownership. This unified platform will also improve the user experience, deliver a more comprehensive security view, and facilitate a more coordinated approach for protecting privacy.
The use of trusted identities is entering a new chapter that will drive profound changes across a variety of industries. As trusted identities are used with unified platforms that align facility and information security, previously independent teams will need to work together to understand and follow best practices for both physical and logical access control. Facilities will also need to explore opportunities to combine authentication and new IoT applications to address a variety of current and future challenges. As they do, there is the opportunity to simplify all aspects of their operations – from opening doors and accessing data, networks and cloud applications to how they manage assets and streamline processes – while creating a better and more secure user experience.
This article is written by Steve Katanas, director of sales, South Asia Pacific at HID Global.
Read part one of this story first on FM.
Image copyright: rawpixel / 123RF Stock Photo