Identity Management

The Essentials of Creating a Visitor Management System and Patient System That Work Together

Hospitals and clinics are places where everyone deserves to feel safe — staff, patients, employees, contractors, and others. Part of that security comes from having a strong and robust visitor management system that allows you to understand and control everyone coming into the facility.

Traditional access management poses several issues for hospitals and clinics:

4 Effective Methods to Protect Against Phishing Attacks

Phishing attacks continue to plague us in 2020 as the number one attack vector of choice by threat actors. Phishing attacks have grown more sophisticated and difficult to spot. Read on to see what you can do to protect your organization from this escalating threat.

fishing hook on keyboard

What the Future Holds for Unified Access Control

The future of access control is a dynamic landscape with unprecedented sophistication and capabilities. As with any uncharted territory, new risks result as well. Regulations such as GDPR, California privacy laws and others continue to impact how businesses deploy and manage security solutions. It’s nearly impossible to keep up with ever-evolving regulations with limited legacy technologies and associated compounded security risks.

Why Statistics Define a Nation's Future

Snapshot moment. It is spring 2020 and we are all thinking about Covid-19: a truly society-changing matter.

Seldom have statisticians been in such demand. Everyone wants the facts, everyone wants the figures, and everyone wants to know what they should do. Are the politicians talking sense? Are they even close to the truth? Which direction is this health crisis taking?

 mother smiling at baby

Why a Hospital Visitor Management System Is a Vital Part of the Healthcare Experience

Families entrust your medical facility with the care of their loved ones, and part of that is balancing security and accessibility to create a welcoming and safe environment. Get that balance right, and you can reduce the stress that goes with being at a hospital or clinic. Get it wrong, and it can become more challenging to manage anxious family members or friends.

little girl in hospital with dad and nurse smiling

SOC Compliance Still the Best Around

Here’s a not-so-fictional scenario: You sign up for a cloud service, one that is going to help transform your digital journey, connect you closer to your customers and streamline business processes. The ROI is impressive. Everyone on your team has signed off on this.

 blue cloud solution graphic

Customer-Friendly Digital Onboarding With Advanced Identity Verification Technologies

What’s the key to winning new business in the banking industry? Increasingly, it’s a customer-friendly onboarding process that also makes it easy to gather vital customer information, conduct identity checks and fully comply with mandatory KYC (Know Your Customer) regulations. And with the recent worldwide quarantines, getting to KYC remotely is more important than ever.

6 Physical Access Security Tips for Returning to the Workplace

Speaking with HID Global customers around the globe, we’re sharing helpful guidance during this unprecedented time.

Being a Smart Customer — Open ID Architectures

Newer generations of ID technologies make the world of identity systems more interesting and visible — and invite a second look at the wider systems design principles and smart customer behaviors.

Today, everyone can see the world of identity changing from the outside. We use ID management tools such as mobile phones every day of our lives. We prove our identity and authenticate ourselves online so often that we seldom give it a second thought. We speed through fast border control without stopping to remember the past (and sometimes even our bags).

FIDO2 and Public Key Infrastructure (PKI) Explained

FIDO2 is a series of specifications designed to create an authentication protocol for the web and online services. FIDO2 makes use of public-key cryptography and other technologies to provide strong authentication when logging into online services from a desktop or mobile device. Let’s dig into common questions around FIDO2: what it is, how it works, and its relationship with PKI.