sb-as logo
Story image

Interview: HID Global on trusted identities in the age of smart buildings

31 Jul 2018

HID Global is one of the world’s biggest names in secure identity solutions. I talked to HID Global’s Harm Radstaak, who was in Melbourne for the ASIAL Security Exhibition & Conference last week.

Radstaak​ is VP and managing director of HID Global’s business unit that specialises in physical access control products and solutions. He says one of the most exciting things about his role is staying alert, embracing innovation and staying ahead of the curve.

 “We see four trends in our industry: The evolution of the identity, connectivity, a subscription-based business model, and the convergence of industries.”

“Historically, physical security has been a closed market. We need to be mindful of technologies in that industry that are blurring the lines. For example video suppliers are moving into access control and vice versa.”

Evolution of identity is one trend that HID Global has embraced. Radstaak​ discussed trusted identities, physical access control, and all manner of authentication methods in the age of smart buildings.

Smart technology is transforming the world through the likes of smart cities and smart buildings. What makes smart technology across the public and private sector so appealing?

“Government and commercial end users see the appeal in different ways. One of the market trends right now is connectivity,” Radstaak​ says.

“What were previously isolated and proprietary systems are now connected. With that, data becomes available. With that data comes more intelligent solutions for managing buildings.”

In the context of smart buildings, workplace optimization also connects smart building management to physical access control.

“Workplace optimisation is about space utilisation and for end users to get more efficient, cost-effective methods of managing that building as well.”

As people enter and exit buildings, another factor comes into play – the identification and authentication of a particular individual.

Trusted identities incorporate identification, as well as the authentication of the person behind that identity. For example, authenticating somebody that enters a particular room, or somebody that needs to access IP or critical infrastructure within that building.

The company has heavily invested in trusted identities; and it offers a number of products and solutions that incorporate trusted identification. One of those is Seos Trusted Identity technology.

“Seos plays into traditional card and reader technology, but it also has applications in other HID Global business units like identity and access management; in a virtual way for mobile access; and for governance.”

“At the end of the day, people don’t want to be tracked, so we need to make sure that identity for governance is being anonymised.”

HID Global has also put significant effort into promoting cloud services, something that was on show at the ASIAL Security Exhibition & Conference.

“As a vendor, we have been displaying mobile access. We’re a leading supplier with thousands of end users organisations having adopted mobile access so far.”

“We’re also re-emphasising our cloud services, which we now offer after acquiring BluVision back in 2016. These include location services and area governance. These play a role in physical access control, smart building, and building management applications.”

Story image
Sophos Rapid Response puts out the ransomware fire
“Attackers are using a range of techniques and whichever defence has a weakness is how they get in. When one technique fails they move on to the next, until they find a weak spot."More
Story image
CompTIA forms Cybersecurity Advisory Council, led by 16 security execs
The new body will be co-chaired by Tech Data director of security solutions Tracy Holtz, and Alvaka Networks chief operating officer and chief information security officer Kevin McDonald.More
Story image
Hornetsecurity acquires Altaro, the latest in acquisition spree
The move is a culmination of a medley of acquisitions made by Hornetsecurity recently, following the January 2019 acquisition of Spamina, a Spanish cloud email security company, as well as EveryCloud, its British market partner, in early 2020.More
Story image
Malware vendors look to marketing to spread Android RAT
What happens when an Android malware vendor teams up with a marketer? It turns out the answer is quite a lot.More
Story image
Malware variants becoming increasingly prevalent, sophisticated and evolved
"The modern threat landscape and ongoing evolution of malware are loud factors pushing every business to understand and identify modern malware threats and the necessary precautions to take to protect against them."More
Story image
Check Point exposes Android malware vendor using dark net to rebrand products
Check Point security researchers have exposed an Android malware vendor using a marketer on the dark net to rebrand its products, with the intention of supercharging business and throwing off security vendors. More