Sveriges mest populära poddar

IT Visionaries

Digitizing the New Age of Access Identity Management with HID Global’s Martin Ladstaetter

48 min • 15 juni 2021

Security identity management comes in all shapes and sizes, and it’s an industry that continues to innovate at a rapid pace and there is no end in sight. Think of identity management like this: that card or fob you scan to enter an office or building, that’s security management. Or maybe the password you change every 30 days, that’s identity management. But while these processes seem simple and familiar, they haven’t been part of the security ecosystem for very long.

“15 years ago, phones were different. We didn't know about online identities. We didn't have digital passports. We were using batches to access buildings. If you fast forward, the pace of what we are changing is pretty traumatic and fast.”

Traumatic and fast are strong but appropriate words when describing the pace at which Martin Ladstaetter, and HID Global, are working at when it comes to making it easier for consumers to access their everyday necessities. On this episode of IT Visionaries, Martin, the Head of Consumer Authentication and VP of Product Management at HID Global, explains how the company is digitizing this new world and securing consumers across multiple networks. Martin also dives into the struggles enterprises are facing when it comes to securing distributed workforces and what the future of access identity management holds.

Main Takeaways

  • Creating an Unknown Digital Experience: Customer experience is key in any sector. In identity management, the key to a good experience is to make it not feel like an experience at all. The future of this space involves users being able to make purchases, access buildings and cars seamlessly, without having to use security cards or fobs or other devices.
  • Is This Ethical?: As distributed workforces rise in popularity, one of the hot discussion topics is how large enterprises should be securing their employees and what is the right line to toe when it comes to security procedures? You don’t want to be constantly monitoring an employee's actions, but at the same time you must make sure you protect sensitive data. Finding a good balance between security and privacy remains key.
  • Securing Against a Single Breakpoint: Every building has multiple entry and exit points — this is necessary in case of an emergency. Your technology should be built the same way, You have to secure your devices and technology against having a single breakpoint. That way, if a a card is deactivated, a phone system breaks down, or a password fails, employees and IT professionals have other ways to gain access.. 

IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform

 

Förekommer på
00:00 -00:00