Story image

Interview: HID Global on trusted identities in the age of smart buildings

31 Jul 2018

HID Global is one of the world’s biggest names in secure identity solutions. I talked to HID Global’s Harm Radstaak, who was in Melbourne for the ASIAL Security Exhibition & Conference last week.

Radstaak​ is VP and managing director of HID Global’s business unit that specialises in physical access control products and solutions. He says one of the most exciting things about his role is staying alert, embracing innovation and staying ahead of the curve.

 “We see four trends in our industry: The evolution of the identity, connectivity, a subscription-based business model, and the convergence of industries.”

“Historically, physical security has been a closed market. We need to be mindful of technologies in that industry that are blurring the lines. For example video suppliers are moving into access control and vice versa.”

Evolution of identity is one trend that HID Global has embraced. Radstaak​ discussed trusted identities, physical access control, and all manner of authentication methods in the age of smart buildings.

Smart technology is transforming the world through the likes of smart cities and smart buildings. What makes smart technology across the public and private sector so appealing?

“Government and commercial end users see the appeal in different ways. One of the market trends right now is connectivity,” Radstaak​ says.

“What were previously isolated and proprietary systems are now connected. With that, data becomes available. With that data comes more intelligent solutions for managing buildings.”

In the context of smart buildings, workplace optimization also connects smart building management to physical access control.

“Workplace optimisation is about space utilisation and for end users to get more efficient, cost-effective methods of managing that building as well.”

As people enter and exit buildings, another factor comes into play – the identification and authentication of a particular individual.

Trusted identities incorporate identification, as well as the authentication of the person behind that identity. For example, authenticating somebody that enters a particular room, or somebody that needs to access IP or critical infrastructure within that building.

The company has heavily invested in trusted identities; and it offers a number of products and solutions that incorporate trusted identification. One of those is Seos Trusted Identity technology.

“Seos plays into traditional card and reader technology, but it also has applications in other HID Global business units like identity and access management; in a virtual way for mobile access; and for governance.”

“At the end of the day, people don’t want to be tracked, so we need to make sure that identity for governance is being anonymised.”

HID Global has also put significant effort into promoting cloud services, something that was on show at the ASIAL Security Exhibition & Conference.

“As a vendor, we have been displaying mobile access. We’re a leading supplier with thousands of end users organisations having adopted mobile access so far.”

“We’re also re-emphasising our cloud services, which we now offer after acquiring BluVision back in 2016. These include location services and area governance. These play a role in physical access control, smart building, and building management applications.”

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.