Industry blog

Posted: 04/14/2014
blog

At ISC West this year, attendees faced many secure access challenges, from limited budgets to a complex credential management process. The economic recovery is likely to further increase complexity by fueling mergers and acquisitions, more remote working, and greater need to recognize, identify and authenticate employees as seamlessly, conveniently and efficiently as possible.  Add to these...

Posted: 03/27/2014
blog

Hospitals face many security threats in an environment complicated by high traffic volumes, complex staffing requirements, and a demanding regulatory environment.  In California, hospitals must report any security breach event, after which the California Department of Public Health (CDPH) checks policies, practices and audit trails, and executes inspections and assesses fines.  Often, hospital...

Posted: 03/11/2014
blog

In my last blog, I discussed some of the issues organizations are facing with their legacy access control systems, and some of the benefits of considering a move to the industry’s latest solutions. The main question customers typically ask, however, is when is a good time to start this transition? There are many possible entry points from which to begin the migration process, including:...

Posted: 02/24/2014
blog

Organizations often avoid or delay change due to concerns about budget and the impact on productivity and workflow. This can be especially dangerous, however, in the access control infrastructure, where a combination of technology obsolescence and escalating security threats can quickly cripple an organization’s ability to protect its people, facilities and data assets. It is far more...

Posted: 02/12/2014
blog

On the majority of today’s university campuses, magstripe cards are used to secure facilities, but feature little or no fraud protection. Low-frequency (125 kHz) card systems, often known as proximity (or prox) cards, can also be cloned. The best way to protect students, faculty and staff is with high-frequency contactless smart card technology that uses mutual authentication and cryptographic...

Posted: 01/27/2014
blog

As 2014 is well underway, there are a handful of core trends that I believe will have the greatest impact on the secure identity industry this year.  These trends include:

The industry is quickly moving beyond static, proprietary access control architectures to more secure, open and adaptable solutions that support the customers’ desire for new products and technologies that...

Posted: 01/15/2014
blog

I’m pleased to say that yesterday HID Global announced the opening of our new World Headquarters and North American Operations Center in Austin, Texas with an audience of dignitaries that included Chairman Michael T. McCaul (Texas) of the House Homeland Security Committee, State...

Posted: 12/30/2013
blog

The modern healthcare facility faces increasing crime and economic challenges in protecting people, property and sensitive data.   There are a number of best practices to consider.  

The first step is to ensure access control systems are based on an open architecture and can therefore support new capabilities over time....

Posted: 12/17/2013
blog

Waste management service companies face a number of challenges in an era of increased expectations related to efficiency and accountability, and the advent of demanding sustainability and other “green” initiatives.  Challenges include reducing unproductive trips, increasing route and fleet efficiencies, and potentially supporting the data-tracking needs of incentive-based customer...

Posted: 12/03/2013
blog

CARTES Paris has traditionally been a resounding success for HID Global and CARTES 2013 was no exception. This year, booth attendees were consistently saying that it was the busiest the show has been for years with 2013 marking a major rejuvenation of the largest contactless technology-centric trade event in EMEA. This was certainly reflected at HID Global’s booth, where there was a constant...

Pages