Articles

Posted: 01/15/14

I’m pleased to say that yesterday HID Global announced the opening of our new World Headquarters and North American Operations Center in Austin, Texas with an audience of dignitaries that included Chairman Michael T. McCaul (Texas) of the House Homeland Security Committee, State...


Posted: 12/03/13

CARTES Paris has traditionally been a resounding success for HID Global and CARTES 2013 was no exception. This year, booth attendees were consistently saying that it was the busiest the show has been for years with 2013 marking a major rejuvenation of the largest contactless technology-centric trade event in EMEA. This was certainly reflected at HID Global’s booth, where there was a constant...


Posted: 11/06/13

Change in the access control industry, together with innovation, is occurring at a rapid pace.   The virtualization of contactless smart cards, and their residency on smartphones, allows a whole host of new innovative thinking, along with the ability to combine many access control applications into a single, very convenient solution.

Recent new developments include using hand gestures...


Posted: 10/08/13

With ASIS International 2013 behind us, I was reflecting on how this year’s event reached a new high for HID Global with the introduction of an exciting and engaging way for customers to interact with our solutions for creating, using and managing secure identities.  Throughout the event, our booth was abuzz with virtual market tours, including:

  • ...


Posted: 09/10/13

It is often said that innovation comes from the confluence of several existing technologies. Today, we have such an event occurring now in smartphones, with the de facto inclusion of accelerometers, the addition of personal wireless technology (NFC and Bluetooth), and a powerful computing platform that is (almost) always connected.  Voila!

This is a perfect recipe for...


Posted: 06/18/13

The modern healthcare facility must contend with a difficult combination of increasing crime, tightening regulations, and economic challenges as administrators and their security teams strive to protect people, property and sensitive data.   The International Association for Healthcare Security and Safety (IAHSS) reported in its 2012 Crime and Security Trends Survey that the number of...


Posted: 05/20/13

As both personal and corporate data and applications move to the cloud and mobile devices, the saying “trust but verify” takes on new meaning.  It captures the practical reality of a world in which so many of our interactions occur online.  More than ever, we need mechanisms to verify the identity of the entities with whom we interact. 

Among the most important best practices is...


Posted: 12/05/12

With advances in the smartphone market, is NFC set to surpass the traditional lock and key?

We rarely go anywhere without our mobile phones - they have long surpassed being used just for calling to say we are running late or for short conversations - we now rely on them for many of our business needs and the variety of convenient applications they can provide to help us in our daily...


Posted: 11/27/12

In this day and age, securing one's identity can be a complicated task.

Despite advancements in security features and technology, it is often the case that security or front-desk personnel validate credentials by simply eyeballing the card for a photo or expiration date. Only in the event where something doesn't seem right in the visual inspection is the credential evaluated more...


Pages