Subscribe to RSS - HID Global

HID Global

HID Global completes NFC-enabled smartphone pilot at two enterprise businesses

 - 
09/25/2012

IRVINE, Calif.—HID Global on Sept. 25 announced the completion of two pilot programs validating how Near Field Communication (NFC)-enabled smartphones allow employees to open doors with a mobile device.

HID Global names Björn Lidefelt president and CEO

 - 
01/27/2020

AUSTIN, Texas—HID Global, a worldwide leader in trusted identity solutions, announced today that Björn Lidefelt has been named company president and CEO.

Proactively going head-to-head with cyber threats

 - 
Wednesday, December 18, 2019

I recently read an article stating that the biggest cyberattack of 2020 has already happened. Needless to say, this sparked my attention, plunging my mind into thoughts of sophisticated cybercriminals who have already hatched a plan attack that’s just sitting in wait, ready to emerge when prompted. While I don’t promote, condone or encourage using scare tactics as a way to educate others and prompt them to take action, this does sound a bit scary; so, I reached out to some cybersecurity experts and members of SIA’s Cybersecurity Advisory Board to better understand and learn what you and I can do to protect ourselves going forward. 

“The most successful cybercriminals are the ones you don’t even know are there,” Tiffany Pressler, senior manager, HID Global, said. 

Min Kyriannis, head, Technology Business Development, Jaros, Baum & Bolles further explained: “Typically, hackers will remain dormant in someone’s network until a sequence or signal is sent to initiate the attack.”

To better understand a cyberattack, Pressler explained the Cyber Kill Chain, eight recognized phases that most cyberattacks go through. The phases are: 

  1. Reconnaissance
  2. Intrusion
  3. Exploitation
  4. Privilege escalation
  5. Lateral movement
  6. Obfuscation/anti-forensics
  7. Denial of service
  8. Exfiltration

“Each phase offers an opportunity to stop the attack, but most aren’t aware that a breach has happened at any of these phases until months or years after the breach has occurred,” Pressler explained. “Based upon that logic, any breach impending in 2020 is probably already significantly down the list of phase stages.” 

This doesn't mean doom and gloom, but rather, a sort of "heads up" to take action now to protect yourself for what you already know is coming.

One of the biggest complaints people talk about is identity theft, so Kyriannis advised to see what services are available. “Following the Equifax data breach, there are free services provided to lock your credit report, for example TrueIdentity,” she said. “Always ask questions about how companies your working with are security the information you’re providing them. I set alerts on my credit cards so that when I use them, a text message is sent to my cell phone.”

Pressler also offers some simple, proactive actions to take now: 

  • Turn on multi-factor authentication for any and all applications and devices. 
  • Use a password manager to help you remember and not reuse passwords. 
  • Always use complex passwords consisting of letters, upper- and lowercase, numbers and symbols. It’s best when your password does not equate to a readable word, sentence or name. 
  • Never click on links in emails or text messages. 
  • Hover over links to reveal the full URL to see if it goes to a legitimate domain, owned by a company.
  • Secure links with a link scanner, such as Norton SafeWeb or ScanURL.
  • Never give out information through webpages launched from a link. Always go to a company’s homepage and log in there.

“If you’re proactive about setting these measures, you’re making it harder for the cybercriminals, but you’re also giving yourself a chance to recover quickly,” Kyriannis encouraged.

How companies can fight against cyber threats

Cyber experts identify top cyber threats for 2020 and offer strategies of defense
 - 
12/16/2019

YARMOUTH, Maine—As 2019 closes, 2020 is full of new possibilities and opportunities. While it’s a time for growth, change and newness, cyber criminals are lurking in the background ready to strike.

State of the physical access control market, part II

Market gaps and strengths, and a future look into physical access control
 - 
10/02/2019

YARMOUTH, Maine—Security brands and companies offer varying technologies, products and services within the physical access control (PAC) market today; therefore, all security companies and professionals must work extra hard to stay relevant.

State of the access control market, part I

Current physical access control (PAC) trends shaping the security industry
 - 
08/20/2019

YARMOUTH, Maine—The concept of access control is simple — to allow or restrict people, animals or things from gaining access to a particular space.

Genetec strengthens its access control offering

Company partners with Mercury Security and HID Global to bring nonproprietary FICAM-certified solutions to the U.S. federal market
 - 
08/14/2019

MONTRÉAL—Genetec, a leading technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it is now offering multiple FICAM-(Federal Identity, Credential, and Access Management) certified options for its Security Center Synergis access control system.

MercTech 5 reveals trends, educates attendees, provides networking opportunities and more

 - 
Wednesday, March 6, 2019

Venturing off to Coronado Island, right outside of San Diego for MercTech 5 was an exciting adventure into the open architecture world of physical security. Various trends were identified, company announcements made, valuable networking with security companies was experienced as well as education and fun. 

To kick off the conference, Matt Barnette, president, Mercury Security, announced that this year, the company will be formally converting to HID Global and they are always looking for new partners. (HID Global purchased Mercury Security, an OEM supplier of controllers for physical access control, in 2017.) Thus far, Mercury Security has kept their original logo, with the added phrase: “part of HID Global.” 

Serra Luck, VP end user and consultant business, HID Global followed with three major trends in the physical access control market: the evolution of identity; service oriented and convergence of video, biometrics, access control, lighting and more to be controlled by a single device. Luck identified what she termed “BIMruption,” building information modeling in which a wholistic view of a building, including its vulnerabilities, can be seen before the structure is actually built. This enables the simulation of possible terror attacks, physical breaches, structural integrity and more so that security consultants, integrators and end-users can become even more proactive in preventing security-related issues.

Donna Chapman, consultant relations business development manager, ASSA ABLOY compared how she “talks up” security consultants to their partners. She likens it to doing taxes. 

“Can I do taxes,” she asked the audience, hypothetically. To which she answered, “yes, but am I up-to-date on all the tax regulations…no, and that’s ‘ok’ unless I get audited. So, it’s easier and safer to have my taxes done by a professional…same with security consultants.”

The two full days of the conference continued on with valuable education as well as meetings with various Mercury Security partners, followed by amazing dinners and networking events. Partners were available in various suites in a “speed dating” type of format, 45 minutes in length, where security consultants learned about their solutions as well as got their questions answered. 

A consultant roundtable took place, in which hot topics were discussed, one of which was the adoption of Open Supervised Device Protocol (OSDP), a communication standard developed by the Security Industry Association (SIA) to improve interoperability among access control and security devices. Security consultants were also concerned with specifying manufacturer’s certifications, asking if companies could possibly add certification numbers or some sort of identification so each certification is easier to “spec.” 

As the event concluded and I began to reflect, one of the most valuable takeaways from the whole conference emerged. Steve Wagner, president of Open Options, said the following during a speed dating session: “Everyone employed with Open Options is empowered to make decisions on behalf of customers; if a mistake is made with any such decisions, it will be to the benefit of the client.” This customer/client-first mentality, in my opinion, is a big piece of the pie that security companies must incorporate into their culture for maximum success. 

 

HID Global launches cloud platform for the connected workspace

Company to help create worldwide innovation ecosystem
 - 
01/23/2019

AUSTIN, Texas—HID Global, a creator of identity solutions based here, recently announced HID Origo, a cloud platform to help partners create a more seamless and intuitive workplace built on HID’s access control architecture.

Access control in the cloud

Powering the future of mobile access, big data, AI and IoT
 - 
11/15/2017

YARMOUTH, Maine—On the residential side of security, the idea of using your phone to disarm your alarm, open your door or just check on things remotely has not only become expected today but demanded, as both manufacturers and dealers have embraced this new wireless world we are all living in. But on the commercial side of the business, especially within access control, that same kind of convenience, ease of use and access to resources and data at your fingertips is not quite there yet, although conversations with some leading cloud providers in this area provide both hope and tempered excitement for the future of access control in the cloud.

Pages