HID - Experts & Thought Leaders
White papers from HID
The 2024 state of physical access trend report
DownloadThe truth behind 9 mobile access myths
Download6 good reasons to embrace mobile credentialing
DownloadThree essential reasons to upgrade your access control technology in 2022
DownloadThe role of access control in a safe return to the workplace
DownloadPhysical access control in higher education
DownloadA brief history of access control credentials
DownloadThe 2020 State of Physical Access Control Report
DownloadFinancial institutions require future-ready physical security technologies
DownloadPhysical security supports a future-proof cyber security strategy
DownloadLatest HID news & announcements
Enhancing enterprise security is high on the list of priorities for businesses across sectors. Within the retail industry, there is an additional focus on enabling new ways of working through management tools. Integrated solutions and applications help to create a robust security landscape and ensure a future-ready posture as organisations look to address emerging risks and create better experiences for next-gen employees. Physical access control (i.e., the readers on the door and the credentials that individuals present to them for authentication) is not only one of the first interactions employees have with security technology but is also the first line of defence in security programs. Good user experience The balance of a good user experience and strong security is critical, though striking that balance has been a challenge historically as security teams are tasked with prioritising safety and protection. Innovative companies who want to go beyond traditional access control have found the balance of a frictionless user experience and strong security in mobile access solutions. Żabka is one of the largest European retail companies with 7000 locations across Poland Żabka is one of the largest European retail companies with 7000 locations across Poland and the Czech Republic. Innovation is in its DNA and the organisation is known as an early adopter. From introducing AI to create an autonomous and checkout-free shopping experience to launching a cloud-based platform to better the franchise management process, Żabka has actively embraced continuous change and improvement. When implementing security for its new headquarters in Poznań, Poland, Żabka returned to its pioneering roots, requiring a highly secure, automated solution that enabled the integration of custom applications and simplified the use of other building-wide office functionalities. Physical security components Żabka’s vision included seamless access starting at building entrances with employees using their mobile phones to ‘badge’ into the building. From there, the same mobile credential would unlock turnstiles, authenticate floor access in elevators, track time and attendance and release documents at shared printers. Most importantly, user data would need to be secured via encryption and authentication through appropriate access keys with the introduction of new users being completely under Żabka’s control. The implementation of an ecosystem with multiple capabilities — including a migration from plastic cards to mobile identities, surveillance tools, access management, and physical security components to underpin the entire solution — also necessitated collaboration between partners who shared Żabka’s spirit of modernisation and vision for a seamless user experience. Traditional plastic credentials Żabka’s comprehensive ecosystem utilises digital access control processes The project team included HID Global who managed the transition from traditional plastic credentials to mobile identities, with Zonifero to develop a custom mobile app, and Cynergy to complete the installation of hardware and embedded components. Żabka’s comprehensive ecosystem utilises digital access control processes and integrated surveillance tools with a security management platform enabling Żabka to migrate completely to the use of mobile identities. The move to HID Mobile Access has changed the experience of employees, visitors, HR, and security administrators by accelerating and automating access control management for the entire building. Integrated surveillance tools Mobile identities, contactless employee onboarding, touchless visitor management, time and attendance, and integration with the security system of the entire building are now aggregated and facilitated within the smartphone app. Security administrators remotely managed a pool of allocated mobile identities The ability to manage the access control system from anywhere with no physical contact was especially valuable. Launched amid the pandemic, the new infrastructure enabled Żabka employees to maintain social distancing and limit contact through automatic and remote activation of access. Security administrators remotely managed a pool of allocated mobile identities and individual access to users’ devices, thereby solving the problem of storing physical cards, facilitating credential transfers, issuing new credentials in the case of lost or damaged ones, and deactivating cards in the event they were lost or stolen. Mobile identity functionalities Żabka implemented mobile access on a large scale with mobile IDs in use by about 800 employees. The retailer also plans to implement further mobile identity functionalities, such as opening parking lot gates, making cafeteria purchases, and seamlessly logging in to computers. Steve is responsible for leading and coordinating demand generation programs and channel marketing activities for HID's Physical Access Control Solutions (PACS) business area in Europe. He has over 20 years of experience working in B2B marketing, 15 of which have been in the safety and security industries.
Founded in 2010, Avolon is the third-largest aircraft leasing company in the world with 824 aircraft and 145 customers in 62 countries. Its new global headquarters in Dublin is comprised of 6,967 sq m (75,000 sq ft) of secure office space across six floors that houses its IT, catering, legal, and communications departments. Need for a centralised monitoring solution Avolon’s new premises in the upmarket Ballsbridge area of Dublin provided an opportunity for the company to rethink its approach to building security. Avolon was looking for an innovative, flexible solution that could be personalised to individuals, easily accessed, and managed remotely. Additional requirements included: the need to provide different levels of security clearance in different areas of the building, the ability to manage individual security clearances, the facilitation of access outside of the usual workday, and secure parking lot access for employees and visitors. As a global company, Avolon wanted a solution that could be deployed worldwide to provide a consistent experience for its employees, regardless of their location. HID’s flexible access control solution Powered by Seos® technology, the solution uses BLE and iCLASS® readers to create a secure access control solution Avolon partnered with systems integrator Summit Security Systems Ltd and deployed HID Mobile Access at its Dublin headquarters. Powered by Seos® technology, the solution uses Bluetooth Low Energy (BLE) and iCLASS® readers to create a secure, convenient, and flexible access control solution for its headquarters. The building’s security system enables credentials on smartphones via an app rather than on physical access cards and uses iCLASS SE® mobile-enabled readers installed at points of access. Key benefits of a mobile access system include: Employees are less likely to forget smartphones, which they always carry than an access badge Security clearances are more efficient and easily changed because security status is provisioned to an app A cloud-based central control system provides security administrators with easy oversight, access to a complete set of metrics, and the ability to manage a network of premises around the globe Employing various access control measures Avolon has implemented a range of different solutions for different parts of its premises that can vary by time of day. For example, elevators utilise access control measures to ease the flow of people within the building during work hours, while assuring that after-hours access is more controlled. Employees simply twist their iOS or Android™ phones when they approach the parking readers to gain entry The ease-of-use and security also extend to the parking lot, which benefits from HID’s “Twist and Goes” feature. Employees simply twist their iOS or Android™ phones when they approach the parking readers to gain entry. Avolon encourages its employees to cycle to work and has extended mobile access to a secure employee bike parking area that links directly into the shower and changing facilities. Advantages of mobile access solution The HID Mobile Access Solution provides many advantages over the previous card-based system including after-hours access (vital to a 24/7 business like Avolon), ready access to secure rooms, and easy management of security clearances. With HID Mobile Access, fine-grained security access for a global network of offices is controlled centrally through a cloud-based portal. Access levels can be set on an individual basis so they are very flexible and can be modified as needed. “Using a mobile phone is much more convenient than access cards. People forget their access cards, but their mobile phone is with them all the time,” said Allan Dawson, facilities project manager at Avolon. “It’s much more efficient. For example, we now have much lower instances of people leaving the perimeter and having to ask for re-entry because they’ve left their pass in the office.” Worldwide installation of physical access solution In the future, Avolon anticipates expanding its new physical access solution across its global campuses. “As well as deploying in our Dublin head office we have also deployed in our New York, Florida, and Hong Kong offices,” said Dawson. “The benefit of using a global platform means our people can travel between offices with their security status intact and ready to go for each location.”
HID, a pioneer in trusted identity solutions, has achieved Texas Risk and Authorisation Management Program (TX-RAMP) certification for its Public Key Infrastructure as a Service (PKIaaS) solution. This certification demonstrates HID’s commitment to cybersecurity excellence and enables Texas state and local government to confidently engage with approved, trusted providers to procure secure, cloud-based certificate lifecycle management services with faster timelines and reduced administrative burden. TX-RAMP certification The TX-RAMP certification validates that HID PKIaaS meets the State of Texas' strict rigorous cybersecurity standards for handling sensitive government data, helping to eliminate the need for individual agencies to conduct their own lengthy security assessments. This approval removes procurement barriers for Texas agencies, municipalities, school districts and other public sector entities seeking to modernise and protect their digital identity infrastructure with automated, cloud-based certificate management. Why compliant certificate management matters Digital certificates are the foundation of secure communication on the Internet, enabling TLS/SSL encryption that protects websites, online transactions and sensitive data. However, managing these protocols manually is challenging, as an expired certificate can cause outages, expose vulnerabilities, and ultimately lead to financial loss and damaged public trust. HID’s PKIaaS solution automates digital certificate management (issuance, renewal and revocation), ensuring continuous compliance and uptime, while maintaining the robust security controls required by government entities handling citizens’ sensitive data. As a globally trusted Certificate Authority, HID also enables seamless automated management of IdenTrust certificates within PKIaaS. Certificates from a globally trusted authority provide instant trust and interoperability across major platforms and devices, simplifying the experience for users.
Insights & Opinions from thought leaders at HID
The healthcare industry faces unique and significant security challenges. Healthcare security professionals must balance an open, welcoming environment for patients and visitors with the need to protect valuable assets and personnel in a high-stress, 24/7 setting. These requirements direct the physical security technologies deployed in medical facilities. We asked our Expert Panel Roundtable: What are the unique aspects of the healthcare market, and how should the physical security industry adapt?
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
