Question Of The Week: How Are Security Decisions Evolving?

security trendsHID Global, a provider of secure identity solutions, has identified security trends to watch in 2016. There are based on its insights gained from customers across numerous markets, along with pilots and deployments with forward-looking partners and end-user organizations. These five developing trends are highlighted by growing market demand for a mobile-centric and more satisfying user experience that the company believes will be the primary driver for security technology innovation in 2016. HID notes that these trends point to a more mobile and connected experience, ongoing advancements in privacy protection, and broader adoption of best practices for solution deployment.

Trend #1: “Mobilizing” security will make it more pervasive and personalized: A new, more secure identity lifestyle will be built around the convenience of ever-present mobile devices. Computer and network logon, driver licenses, and other applications will more seamlessly join physical security functions on phones, tablets and laptops. Wearables will be the next step, and phones will also work with RFID tags to add security and trust to the IoT for proof-of-presence applications.

Trend #2: Security will move to a much greater focus on the user experience: This will help close the gap between planning and compliance, while ensuring that security adapts to rather than defines end-user habits and lifestyles. Old ways of authenticating will be replaced by more satisfying alternatives.

security trends
(Credit: perspecsys.com)

Trend #3: Secure, connected identities will fuel safety and innovation in how we work, shop and play: The industry will enter its next new chapter of connected identities, employing multi-layered security strategies that also include biometrics in order to bind these identities to their legitimate owners.

Trend #4: There will be more attention on privacy in an increasingly connected and mobile-first world: Identity will expand beyond people and their personal identity to the identity of objects and their authenticity, accentuating the need to protect personal information across increasingly interconnected devices, services and applications.

Trend #5: Security policies and best practices will become as important as technology advances: The industry will sharpen its focus on not only what to deploy, but how — from the first U.S. mobile driver licenses to unified credential management systems that enable organizations to more holistically address both facility and information security. Rather than focus exclusively on preventing breaches, the industry will also adopt best practices for controlling what happens afterwards, so stolen identities are useless to thieves.

How are your security decisions evolving in the face of technology macro trends? Are these trends impacting your security decisions?