ast week, I discussed a handful of trends that I believe are at the core of understanding how access control products and solutions will be used in 2013.
This week I'd like to share some of the additional drivers that I believe will significantly influence how end-users, enterprises and government organizations will implement security identity solutions. These are:
Mobile access control is accelerating identity management’s move to the cloud, supported by new managed services.
Companies have already begun outsourcing their traditional badging projects to cloud-based service providers that have the scale and resources to handle large-volume orders with tight deadlines that would otherwise be difficult for an individual credential issuer or integrator to accommodate on its own. And now, with the advent of mobile access control, the scope of services is growing to include deploying and managing mobile credentials carried on users’ NFC-enabled smartphones.
Organizations will provision mobile access control credentials in one of two ways. The first is via the same type of internet portal used to provision traditional plastic credentials (the mobile device will be connected to the network via a USB or Wi-Fi-enabled link). The second approach is over-the-air via a mobile network operator, similar to how smartphone users download apps and songs. Common access control trusted service managers (TSMs) will interface seamlessly to the mobile network operator (MNO), its TSM, and the NFC mobile phones that receive the encrypted keys and credentials for storage in the phone’s secure element, SIM or microSD New applications will also be pushed to the phone, so that multi-factor authentication becomes a contextual, real-time managed service.
read more...........http://www.hidglobal.com/blog/2013-trends-part-2