Story image

Interview: HID Global talks trusted identities, privacy & why we need to be ready for smart buildings

16 Aug 2017

HID Global is a major player in the identity management space and more committed to trusted identities than ever before.

At the Security Exhibition & Conference last month, Serra Luck, HID Global's VP End User and Consultant Business - Physical Access Control Solutions, discussed asset tracking, security and why identity access management is key to building a successful organisation.

The company has just released a product that tracks assets as they move to and from a space. Whether people, physical objects or other items, it’s all about optimising resource use.

Late last year HID Global acquired Bluvision, a Bluetooth-based real time location services provider.

From that came HID Location Services, which has now launched in the APAC market. It helps to improve workplace optimisation for the enterprise market; condition monitoring for engines; asset tracking in the IoT space that is protected by encryption.

Essentially asset tracking means that every device trusts each other within a building – useful when some devices could potentially be hazardous, the company explains.

Luck explains that with trusted identities, HID provides credentials to millions of users. These protect places, things and people.

“An identity can be provided to anyone but it’s extremely important that the identity is trusted so you don’t need to introduce it to multiple systems again and again. It is authenticated, authorised and trusted by different systems, so it can be re-utilised.”

She says that physical access control is still in a traditional place, but that will soon change.

“We see a lot of changes happening in IT. With smart buildings and smart cities coming in, and other changes happening in the marketplace, we see the change is coming to physical access control security. The evolution is there.”

Since 2014, the company saw those changes coming, and has spent the last three years working with mobile access technologies. She says this is one of the reasons the company acquired Bluvision.

“A traditional card reader company would be issuing and personalising a card, managing it with different services and sending it to the user. Now with mobile access, a smartphone can do exactly the same thing as a card, and more. For smart buildings, it can open a door. It can help to access vending machines.”

“We also see that with trusted identities and connectivity, we’ve been asked about convergence. People ask, ‘Hey, I’m in IT, I’m using my identity as Serra and now I need to have another identity to access the building. Why do I need to have two?’”

“The challenge is how to put these things together. With smart building and building management systems coming in, trusted identities would be able to serve IT services, physical access security services. This is why we suggest that organisations consider combining technology such as SEOS," she explains.

With such mobile access and physical access control logs being generated all the time, we asked how this data is managed securely.

“Privacy is extremely important. We see different laws and regulations around the world. There’s no single model but people, governments and organisations care about privacy. In a service environment such as location-based services, it’s more important to focus on the service without necessarily attaching it to the ‘who’. How do I do it and what type of benefits does it bring. For example, do I have everyone that needs to be outside actually outside in case of fire.”

“It’s not about tracking or monitoring people, it’s about keeping the bad people out and preventing insider attacks with the right risk management. We can make data anonymous – we don’t even need to know who is accessing the system as long as you as an enterprise decide that. It’s important for financial and government customers that we secure those environments," Luck says.

While there is still a spot for physical access control, Luck is adamant that organisations can’t ignore the virtual world.

“The younger generations will be pulling it, especially the people who move a lot in larger organisation. There’s the convenience of it. As a security officer issuing multiple cards, virtual identities are more convenient and sustainable.”

“It’s up to the enterprise what risks they want to take and how they want to manage that risk,” Luck concludes.

Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Norwegian aluminium manufacturer hit hard by LockerGoga ransomware attack
“IT systems in most business areas are impacted and Hydro is switching to manual operations as far as possible.”
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.
Mozilla launches Firefox Send, an encrypted file transfer service
Mozille Firefox has launched a free encrypted file transfer service that allows people to securely share files from any web browser – not just Firefox.