Steve Currie
Steve Currie
Vice President and Managing Director - Extended Access Technologies Business Unit, HIDSteve Currie is currently working in the capacity of Vice President and Managing Director for Extended Access Technologies Business Unit at HID Global. He has previously worked as Deputy General Manager at Sony and Director of North Asia/Presidennt for Japan region at Ingenico. Steve is an alumnus of the prestigious University of Strathclyde.
News mentions
HID, a pioneer in trusted identity solutions, announces it has ranked highest among 19 solution providers on the growth index of the Frost Radar benchmarking system for analysing biometric authenticat...
HID Global, trusted identity solutions announced that American Security Today (AST) has recognised its HID NOMAD™ 30 Pocket Reader and WorkforceID™ solutions as winners...
HID Global, the globally renowned provider of trusted identity solutions, has announced that its next-generation Seos credential technology will enable Nymi Band 3.0 users to seamlessly open doors and...
HID Global, a provider of trusted identity solutions, announces that it has acquired Access-IS, a provider of miniaturised reader devices that combine a number of key technologies ideal for mission-cr...
HID Global, a globally renowned company in trusted identity solutions, has announced the launch of its smallest embedded reader module, the OMNIKEY 5127CK Reader Core. The latest addition to the prov...
HID Global, a worldwide provider of trusted identity solutions, announced it has collaborated with software company Alutel Mobility to power employee authentication at Newmont’s polymetallic min...
HID Global, globally-renowned provider of trusted identity solutions, has announced a strategic collaboration with Fidesmo, a provisioning company that makes it possible to connect contactless service...
Key people from HID
Security experts
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
