Security Sales & Integration February 2022 - 6

INDUSTRY PULSE
Integrators can make
the world much more
NEWS ANALYSIS RESEARCH PEOPLE
How Trusted Identities Can Balance
Security and Convenience By Todd Seeley
IN DEPTH
convenient as they harness a combination
of biometrics and Cloud-based
identity management solutions to help
drive an evolution in how people interact
with technologies to access buildings,
applications and services. Trusted
identities have played a historical role as
the means for granting access. However,
consumers now look to technology to
help expedite everyday activities such as
banking, hospitality, ticketing, vending,
retail and access to other services while
ensuring trust that the system knows
who is interacting with it and that it is
not someone else.
Integrators that facilitate their customers'
adoption of biometrics and
Cloud-based identity technologies will
enable them to immediately meet consumer
expectations for a more convenient
and enjoyable user experience that
drives significantly greater loyalty to the
customer's brand.
Trusted identities on cards have been
used to manage how people enter and
move through buildings and access resources
and services. They increase confidence
that people are who they say they
are because the user ID the system employs
to grant or deny access is issued by
a trusted source and cannot be copied to
another card or media. Yet this has not
prevented someone from sharing a card,
or the potential for unauthorized access
when a card is lost or stolen.
This situation changed with the advent
of mobile trusted identities. Not
only do people generally not share their
mobile device with others, but both the
system administrator and the mobile device
user can choose to require a successful
device authorization prior to allowing
any transaction to start. As a result,
many have migrated to mobile devices
6
Trusted identity security is improved by adding biometric solutions such as
fingerprint and facial recognition.
for access, along with the Cloud-based
identity management systems to which
they are connected.
Managing Cloud-Based
Trusted Identities
A trusted identity is data, and data can
represent an employee ID, a credit card, a
driver's license, a baseball or a loyalty card
for the local creamery. In fact, people use
Cloud-based systems daily to load their
credit cards into their mobile wallets and
purchase gas or a soda at the convenience
store. These and other Cloud-based systems
allow the secure creation, delegation,
delivery and presentation of data for
any application.
Cloud-based platforms, for example,
can incorporate a cryptographically protected
secure vault designed to provide a
Security Sales & Integration FEBRUARY 2022
consistent model for storing and using
data so a user can access buildings, resources
and services. Once this data is
on the user's mobile device, the user can
experience access to any application in a
convenient way whether to open doors,
enter sports venues or interact with banks
to cite a few examples.
Convenience and security are further
improved by adding biometric solutions
such as fingerprint and facial recognition.
These technologies simultaneously
play a huge role in how people gain access
to devices and services.
Biometric solutions have been embraced
for their convenience as they enable
people to use their face to unlock their
phones, and their fingerprint to log-in and
authorize payment while shopping online.
In these and other applications biometrics
securitysales.com
SITTHIPHONG/STOCK.ADOBE.COM
http://www.securitysales.com

Security Sales & Integration February 2022

Table of Contents for the Digital Edition of Security Sales & Integration February 2022

Security Sales & Integration February 2022 - Cover1
Security Sales & Integration February 2022 - Cover2
Security Sales & Integration February 2022 - 1
Security Sales & Integration February 2022 - 2
Security Sales & Integration February 2022 - 3
Security Sales & Integration February 2022 - 4
Security Sales & Integration February 2022 - 5
Security Sales & Integration February 2022 - 6
Security Sales & Integration February 2022 - 7
Security Sales & Integration February 2022 - 8
Security Sales & Integration February 2022 - 9
Security Sales & Integration February 2022 - 10
Security Sales & Integration February 2022 - 11
Security Sales & Integration February 2022 - 12
Security Sales & Integration February 2022 - 13
Security Sales & Integration February 2022 - 14
Security Sales & Integration February 2022 - 15
Security Sales & Integration February 2022 - 16
Security Sales & Integration February 2022 - 17
Security Sales & Integration February 2022 - 18
Security Sales & Integration February 2022 - 19
Security Sales & Integration February 2022 - 20
Security Sales & Integration February 2022 - 21
Security Sales & Integration February 2022 - 22
Security Sales & Integration February 2022 - 23
Security Sales & Integration February 2022 - 24
Security Sales & Integration February 2022 - 25
Security Sales & Integration February 2022 - 26
Security Sales & Integration February 2022 - 27
Security Sales & Integration February 2022 - 28
Security Sales & Integration February 2022 - 29
Security Sales & Integration February 2022 - 30
Security Sales & Integration February 2022 - 31
Security Sales & Integration February 2022 - 32
Security Sales & Integration February 2022 - 33
Security Sales & Integration February 2022 - 34
Security Sales & Integration February 2022 - 35
Security Sales & Integration February 2022 - 36
Security Sales & Integration February 2022 - 37
Security Sales & Integration February 2022 - 38
Security Sales & Integration February 2022 - 39
Security Sales & Integration February 2022 - 40
Security Sales & Integration February 2022 - 41
Security Sales & Integration February 2022 - 42
Security Sales & Integration February 2022 - 43
Security Sales & Integration February 2022 - 44
Security Sales & Integration February 2022 - 45
Security Sales & Integration February 2022 - 46
Security Sales & Integration February 2022 - 47
Security Sales & Integration February 2022 - 48
Security Sales & Integration February 2022 - 49
Security Sales & Integration February 2022 - 50
Security Sales & Integration February 2022 - 51
Security Sales & Integration February 2022 - 52
Security Sales & Integration February 2022 - 53
Security Sales & Integration February 2022 - 54
Security Sales & Integration February 2022 - 55
Security Sales & Integration February 2022 - 56
Security Sales & Integration February 2022 - 57
Security Sales & Integration February 2022 - 58
Security Sales & Integration February 2022 - 59
Security Sales & Integration February 2022 - 60
Security Sales & Integration February 2022 - 61
Security Sales & Integration February 2022 - 62
Security Sales & Integration February 2022 - 63
Security Sales & Integration February 2022 - 64
Security Sales & Integration February 2022 - Cover3
Security Sales & Integration February 2022 - Cover4
https://www.nxtbook.com/emerald/securitysales/august_2023
https://www.nxtbook.com/emerald/securitysales/july_2023
https://www.nxtbook.com/emerald/securitysales/june_2023
https://www.nxtbook.com/emerald/securitysales/may_2023
https://www.nxtbook.com/emerald/securitysales/april_2023
https://www.nxtbook.com/emerald/securitysales/march_2023
https://www.nxtbook.com/emerald/securitysales/february_2023
https://www.nxtbook.com/emerald/securitysales/january_2023
https://www.nxtbook.com/emerald/securitysales/december_2022
https://www.nxtbook.com/emerald/securitysales/november_2022
https://www.nxtbook.com/emerald/securitysales/october_2022
https://www.nxtbook.com/emerald/securitysales/september_2022
https://www.nxtbook.com/emerald/securitysales/august_2022
https://www.nxtbook.com/emerald/securitysales/july_2022
https://www.nxtbook.com/emerald/securitysales/june_2022
https://www.nxtbook.com/emerald/securitysales/may_2022
https://www.nxtbook.com/emerald/securitysales/april_2022
https://www.nxtbook.com/emerald/securitysales/march_2022
https://www.nxtbook.com/emerald/securitysales/february_2022
https://www.nxtbook.com/emerald/securitysales/january_2022
https://www.nxtbook.com/emerald/securitysales/december_2021
https://www.nxtbook.com/emerald/securitysales/november_2021
https://www.nxtbook.com/emerald/securitysales/october_2021
https://www.nxtbook.com/emerald/securitysales/september_2021
https://www.nxtbook.com/emerald/securitysales/august_2021
https://www.nxtbook.com/emerald/securitysales/july_2021
https://www.nxtbook.com/emerald/securitysales/june_2021
https://www.nxtbook.com/emerald/securitysales/may_2021
https://www.nxtbook.com/emerald/securitysales/apr_2021
https://www.nxtbookmedia.com