Industry blog

Posted: 08 Jul 2014

Today’s secure identity technologies enable organizations to use a combination of smart cards and other smart devices in a growing ecosystem of interoperable products and applications.  Smartphones are expected to steadily replace mechanical keys and physical access cards as part of a centralized access and identity management system that can adapt to evolving threats and  business...

Posted: 08 May 2014

We recently released an infographic  that captures the survey results of 600 respondents and  revealed enterprise end users’ perceptions about change, as well as the importance of industry best practices. It also gave us a glimpse into how well today’s technology and policy best practices are being implemented.  Among the many interesting findings, the attitudes uncovered in the survey point...

Posted: 14 Apr 2014

At ISC West this year, attendees faced many secure access challenges, from limited budgets to a complex credential management process. The economic recovery is likely to further increase complexity by fueling mergers and acquisitions, more remote working, and greater need to recognize, identify and authenticate employees as seamlessly, conveniently and efficiently as possible.  Add to these...

Posted: 27 Mar 2014

Hospitals face many security threats in an environment complicated by high traffic volumes, complex staffing requirements, and a demanding regulatory environment.  In California, hospitals must report any security breach event, after which the California Department of Public Health (CDPH) checks policies, practices and audit trails, and executes inspections and assesses fines.  Often, hospital...

Posted: 12 Feb 2014

On the majority of today’s university campuses, magstripe cards are used to secure facilities, but feature little or no fraud protection. Low-frequency (125 kHz) card systems, often known as proximity (or prox) cards, can also be cloned. The best way to protect students, faculty and staff is with high-frequency contactless smart card technology that uses mutual authentication and cryptographic...

Posted: 27 Jan 2014

As 2014 is well underway, there are a handful of core trends that I believe will have the greatest impact on the secure identity industry this year.  These trends include:

The industry is quickly moving beyond static, proprietary access control architectures to more secure, open and adaptable solutions that support the customers’ desire for new products and technologies that...

Posted: 15 Jan 2014

I’m pleased to say that yesterday HID Global announced the opening of our new World Headquarters and North American Operations Center in Austin, Texas with an audience of dignitaries that included Chairman Michael T. McCaul (Texas) of the House Homeland Security Committee, State...

Posted: 30 Dec 2013

The modern healthcare facility faces increasing crime and economic challenges in protecting people, property and sensitive data.   There are a number of best practices to consider.  

The first step is to ensure access control systems are based on an open architecture and can therefore support new capabilities over time....

Posted: 17 Dec 2013

Waste management service companies face a number of challenges in an era of increased expectations related to efficiency and accountability, and the advent of demanding sustainability and other “green” initiatives.  Challenges include reducing unproductive trips, increasing route and fleet efficiencies, and potentially supporting the data-tracking needs of incentive-based customer...

Posted: 03 Dec 2013

CARTES Paris has traditionally been a resounding success for HID Global and CARTES 2013 was no exception. This year, booth attendees were consistently saying that it was the busiest the show has been for years with 2013 marking a major rejuvenation of the largest contactless technology-centric trade event in EMEA. This was certainly reflected at HID Global’s booth, where there was a constant...