HID Global’s 2016 trends point to a more mobile and connected experience, ongoing advancements in privacy protection and broader adoption of best practices for solution deployment. The trends include:
- “Mobilizing” security will make it more pervasive and personalized: a new, more secure identity lifestyle will be built around the convenience of ever-present mobile devices. Computer and network logon, driver licenses and other applications will more seamlessly join physical security functions on phones, tablets and laptops. Wearables will be the next step, and phones will also work with RFID tags to add security and trust to the IoT for proof-of-presence applications.
- Security will move to a much greater focus on the user experience: This will help close the gap between planning and compliance, while ensuring that security adapts to rather than defines end-user habits and lifestyles. Old ways of authenticating will be replaced by more satisfying alternatives.
- Secure, connected identities will fuel safety and innovation in how we work, shop and play: The industry will enter its next new chapter of connected identities, employing multi-layered security strategies that also include biometrics in order to bind these identities to their legitimate owners.
- There will be more attention on privacy in an increasingly connected and mobile-first world: Identity will expand beyond people and their personal identity to the identity of objects and their authenticity, accentuating the need to protect personal information across increasingly interconnected devices, services and applications.
- Security policies and best practices will become as important as technology advances: The industry will sharpen its focus on not only what to deploy, but how – from the first U.S. mobile driver licenses to unified credential management systems that enable organizations to more holistically address both facility and information security. Rather than focus exclusively on preventing breaches, the industry will also adopt best practices for controlling what happens afterwards, so stolen identities are useless to thieves.