The world of access and security is exploding. Today’s identity systems are tasked with empowering new categories of users and agents while reaching into the cloud to enable new applications and enabling access from a world of new devices. We’re moving to increasingly federated systems to manage these new realities, but our identity infrastructure hasn’t kept pace.
18 Dec, 2014Put identity at the center with a federated service
New demands, serve legacy applications and evolve your aging directory infrastructure
17 Dec, 2014White paper advocates smart health care IDs
Smart cards and other types of “subscriber identity tokens” can be an effective tool to reduce medical identity theft, improve privacy, combat fraud by both claim submitters and patients and enable patient matching in health care provider systems.
16 Dec, 2014The future of the identity ecosystem is mobile
Part of the future of identity series
Consumer and personal identities are tied to mobile phones. Although most of us recognize that mobile phones are not the most secure way to exchange information and access content, the convenience factor reigns supreme. Efforts are underway, however, to make the mobile the best and most secure way to communicate identity.
15 Dec, 2014Winter 2014 Regarding ID magazine available via interactive PDF viewer
The Winter 2014 issue of Regarding ID magazine looks at the rise of mobile identity; possible revisions to the four levels of assurance; how the airport of the future will identify travelers; a look at PIV-I and CIV; new certification for physical access control and the latest NSTIC pilot winners.
12 Dec, 2014Certificates, trusted identities and the Internet of Things
Part of the future of identity series
Consumers wants access to data anywhere at anytime. And while this is somewhat possible at this point it’s not always that easy or secure. The Internet or Things and wearable technologies are going to start making identity easy and secure for all.
12 Dec, 2014Episode 134: Body recognition biometrics
Body recognition biometrics may be the most accurate form of authentication, based on theoretical research conducted at the University of Adelaide. A PhD student used an old online database of body measurements from 4,000 U.S. military personnel to come up with this system. What she found is that a series of large body measurements combined with one another is better than facial recognition.
11 Dec, 2014Gemalto’s new Sealys security, SecuGen’s biometric smart card reader, Tactivo updated
Gemalto launched Sealys Secure Surface a new family of cost-effective security features for polycarbonate identity documents; Sticky Password announced the latest version of its password management software; SecuGen announced the release of the Hamster Pro Duo/CL, a product that combines a contactless smart card reader with an optical fingerprint reader; Precise Biometrics launched three new Tactivo smart card readers for iPhone 6, iPad mini 3 and iPad Air 2.