|

Top 10 Access Control Trends

NO RATINGS
View comments: newest first | oldest first | threaded
HID Global
User Rank
Stock Keeper
Re: Access control
HID Global   1/3/2012 11:50:07 AM
NO RATINGS

Thank you for the comments, and yes, these trends encompass both physical access to buildings and logical access to data and networks. Both of these types of access control are transitioning beyond traditional cards and readers to also take the form of portable credentials that can be stored on smartphones and other mobile devices. To answer the question about biometrics, as I mentioned in the article, there is the growing need for multiple layers of card security, including two-factor authentication and biometric templates, in addition to a number of new forms of higher card security in 2011. And finally, to answer the question about securing cloud services, there are two key issues – ensuring that portable credentials can be provisioned via cloud-based services, and ensuring the overall security of these and other cloud services and applications. We address the first issue with our Trusted Identity Platform(TIP), which establishes a secure boundary within which all cryptographic keys governing system security can be delivered with end-to-end privacy and integrity. TIP provides the framework and delivery infrastructure for a new secure, open and independent identity data structure what we call Secure Identity Objects, or SIOs, on the credential side, and corresponding SIO interpreters on the reader side. SIOs and SIO interpreters perform similar functions to traditional cards and readers, only using a significantly more secure and flexible data structure and being able to reside on multiple platforms. They enable a new class of portable identity credentials that can be securely provisioned over the aire in a cloud-based service environment and safely embedded into both fixed and mobile devices, all within the secure TIP boundary. We address the second cloud security issue through our ActivIdentity brand. Many organizations are delaying cloud-based applications deployment because they are uncertain how to protect data outside their firewall. To solve this problem, our solutions provide OTP, OOB, and smart card strong authentication in front of SAML V2-enabled cloud applications so that an enterprise to use their preferred strong authentication method wherever their data resides. (Posted for Tam Hulusi, HID Global).

prabhakar_deosthali
User Rank
Supply Network Guru
Re:
prabhakar_deosthali   12/6/2011 12:55:52 AM
NO RATINGS

To have a really secure access, in my opinion, something that autheticates the person's physical identity and ensures physical presence at the access point is essential rather than the codes on smart cards or mobile devices. The best way to do this biometric readers who can identify a person by his/her thumb impression which cannot be duplicated , cannot be stolen.

t.alex
User Rank
Supply Network Guru
Re: Access control
t.alex   12/2/2011 9:39:39 AM
NO RATINGS

With the growth of cloud services, online access control will also play more important role in the coming years. What will be the trend?

jbond
User Rank
Supply Network Guru
re:
jbond   12/2/2011 7:50:24 AM
NO RATINGS

We are well aware of these types of access controls since my husband works for a large chemical company who has serious security controls. I think all too often people take this technology for granted and assume that if something goes wrong with a financial transaction they will be bailed out by their banks. 

bolaji.ojo
User Rank
Blogger
Re: Access control
bolaji.ojo   12/1/2011 5:36:22 PM
NO RATINGS

Access in this case extends from products that control physical access to buildings and other infrastructure to things like access to our electronic gadgets such as smartphones, laptops and tablets. It's a big and growing market because of security concerns but I wonder how many consumers actually pay much attention to issues like this. We just swipe and expect it to work and hope we don't become a victim of fraud.

Anna young
User Rank
Blogger
Re: Access control
Anna young   12/1/2011 5:30:52 PM
NO RATINGS

@Barbara, I believe the "access" referred to here are devices (hardware and software) rather than physical access to a building for instance. The access products include smart cards, door access devices and software and other types of access such as for financial transactions and the ones used to gain secured access to our smartphones, computers, information technology systems, etc. It's an interesting subject but one that is often cloaked in suspense because the new systems being constantly introduced.

Barbara Jorgensen
User Rank
Blogger
Access control
Barbara Jorgensen   12/1/2011 2:30:27 PM
NO RATINGS

I'm going to plead ignorance here. Are we primarily talking about physical access control?



Twitter Feed
EBN Online Twitter Feed
EBN Dialogue / LIVE CHAT
EBN Dialogue enables you to participate in live chats with notable leaders and luminaries. Open to the entire EBN community of electronics supply chain experts, these conversations see ideas shared, comments made, and questions asked and answered in real time. Listed below are upcoming and archived chats. Stay tuned and join in!
Archived Dialogues
Live Chat 01/15: CPOs Re-Shape Their Business Roles
Increasingly chief procurement officers (CPOs) are re-shaping their organizational role to focus on creating results far beyond cost controls. A new IBM survey explores how.
Live Chat 11/12: Examining the Cyberthreat to Supply Chains
The number of cyberattacks is on the rise and hackers are targeting the supply chain. Drew Smith, founder and CEO of InfoArmor, will be on hand to discuss the reality of today's threat landscape and what to do about it.