Thank you for the comments, and yes, these trends encompass both physical access to buildings and logical access to data and networks. Both of these types of access control are transitioning beyond traditional cards and readers to also take the form of portable credentials that can be stored on smartphones and other mobile devices. To answer the question about biometrics, as I mentioned in the article, there is the growing need for multiple layers of card security, including two-factor authentication and biometric templates, in addition to a number of new forms of higher card security in 2011. And finally, to answer the question about securing cloud services, there are two key issues – ensuring that portable credentials can be provisioned via cloud-based services, and ensuring the overall security of these and other cloud services and applications. We address the first issue with our Trusted Identity Platform(TIP), which establishes a secure boundary within which all cryptographic keys governing system security can be delivered with end-to-end privacy and integrity. TIP provides the framework and delivery infrastructure for a new secure, open and independent identity data structure what we call Secure Identity Objects, or SIOs, on the credential side, and corresponding SIO interpreters on the reader side. SIOs and SIO interpreters perform similar functions to traditional cards and readers, only using a significantly more secure and flexible data structure and being able to reside on multiple platforms. They enable a new class of portable identity credentials that can be securely provisioned over the aire in a cloud-based service environment and safely embedded into both fixed and mobile devices, all within the secure TIP boundary. We address the second cloud security issue through our ActivIdentity brand. Many organizations are delaying cloud-based applications deployment because they are uncertain how to protect data outside their firewall. To solve this problem, our solutions provide OTP, OOB, and smart card strong authentication in front of SAML V2-enabled cloud applications so that an enterprise to use their preferred strong authentication method wherever their data resides. (Posted for Tam Hulusi, HID Global).
To have a really secure access, in my opinion, something that autheticates the person's physical identity and ensures physical presence at the access point is essential rather than the codes on smart cards or mobile devices. The best way to do this biometric readers who can identify a person by his/her thumb impression which cannot be duplicated , cannot be stolen.
We are well aware of these types of access controls since my husband works for a large chemical company who has serious security controls. I think all too often people take this technology for granted and assume that if something goes wrong with a financial transaction they will be bailed out by their banks.
Access in this case extends from products that control physical access to buildings and other infrastructure to things like access to our electronic gadgets such as smartphones, laptops and tablets. It's a big and growing market because of security concerns but I wonder how many consumers actually pay much attention to issues like this. We just swipe and expect it to work and hope we don't become a victim of fraud.
@Barbara, I believe the "access" referred to here are devices (hardware and software) rather than physical access to a building for instance. The access products include smart cards, door access devices and software and other types of access such as for financial transactions and the ones used to gain secured access to our smartphones, computers, information technology systems, etc. It's an interesting subject but one that is often cloaked in suspense because the new systems being constantly introduced.
EBN Dialogue enables and encourages you to participate in live chats with notable leaders and luminaries. Not only editors and journalists, but the entire EBN community is able to comment and ask questions. Listed below are upcoming and archived chats.
Thailand Stages a Comeback Join EBN contributor Jennifer Baljko on Thursday August 23, 2012, at 11:00 a.m. EST for a live chat on how electronic manufacturers in Thailand have shored up their supply chain to reduce the impact of future natural disasters.
Microsoft Surface: Potential Winners & Losers What are the implications for the electronics industry supply chain of Microsoft Corp.'s decision to launch its own tablet PC? Join industry veteran and EE Times' systems and OEM expert Rick Merritt on Tuesday, July 3, at 12:00 pm EDT for a Live Chat on this subject.
Join EBN contributor Jennifer Baljko on Thursday August 23, 2012, at 11:00 a.m. EST for a live chat on how electronic manufacturers in Thailand have shored up their supply chain to reduce the impact of future natural disasters.
Peter Drucker famously said "Trying to predict the future is like trying to drive down a country road at night with no lights while looking out the back window." Yet in the razor's-edge world of electronics—with a lean supply chain and just-in-time demands—the need to know the future is vital.
While no one really can accurately predict the future, we can take guidance from another Drucker saying which is the best way to predict the future is to create it.
You've heard the saying "the No. 1 supply chain risk is your people." That hasn't always been the case. But today's complex global supply chain requires a new type of multitalented employee. It's one who understands, finance, marketing, economics, is savvy with technology, graceful with relationships and can think analytically.
Where are these people? Are universities properly preparing the next generation supply chain professionals? How do train your existing workforce for these new, demanding positions?
Brian Fuller, editor-in-chief of EBN, will lead a 60-minute Avnet Velocity panel discussion that will ask and answer these and other questions swirling around today's supply-chain talent challenges.