Access & identity expectations for 2024

SMART Access & Identity 2024 Editor's Choice, Access Control & Identity Management, Information Security, AI & Data Analytics

What does 2024 have in store for the access and identity industry? According to the participants in our round table, 2023 was a challenging year for the industry, but a good year as things eventually got back to normal after the pandemic panic. Does that bode well for the year ahead?

Will the economy keep crawling along, or can we expect problems, given the political and social challenges here and globally? Are end users ready to adopt the latest technology and extend the value of identity to other areas of the business world, or are we stuck opening doors? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Tarryn Fortune.

Tarryn Fortune, Inland Business Development Manager, Gallagher Security

Over several months, the Gallagher marketing and research teams surveyed end users, channel partners and consultants worldwide to discover what is on the horizon for 2024 and the emerging trends impacting businesses and their security priorities. The security industry has been moving toward a digital change for years, and from what we have learned from our channels across the globe, that change is about to take off. The year 2024 will be a year of escalating transition.

Gallagher is focused on the following topics for 2024:

• How cybersecurity is affecting budgets and spending going into 2024.

• The key integrations end users are prioritising.

• How businesses are dealing with staffing and skills shortages.

• Why are end users and channel partners at odds with cloud deployment?

• How data reporting is changing how businesses use security systems.

There is an increasing recognition by channel partners that transitioning to cloud-based solutions is inevitable, but end users are slower to prioritise their adoption. Those who plan to deploy cloud solutions anticipate incorporating them as part of a hybrid deployment strategy with their organisational systems, with minority planning on an all-cloud environment.

With a wealth of data at their fingertips, end users are beginning to see the operational benefits hidden within their security data; however, many cite the complexities and time consumption of data collation as significant barriers to extracting trends and insights. There is a growing need for a ‘single pane of glass’ approach to simplify security data management, and many users are hoping AI tools will help speed up the process and reduce the burden on human resources in the near future.

There is a real and growing need in the market for the collation, reporting, and analysis of data to aid in decision-making, identification of trends and anomalies, and predictions of vulnerabilities within organisations.

Surveillance is the top integration priority for end users who repeatedly identify video as the most needed addition to their current system, with plans to invest in these solutions now and into the year.

Lumard Groenewald.

Lumard Groenewald BDM SALTO Systems Africa

As SALTO Systems is synonymous with innovative solutions, we expect some of our existing product platforms to grow an even stronger market presence with exciting new additions to feature in 2024.

The continued widespread shift to cloud-based access control with cloud-based systems’ convenience, scalability, and cost-effectiveness is driving adoption across various sectors. SALTO will likely see this trend continue, leading to increased demand for its cloud-based access control solutions. SALTO Homelok is SALTO’s new cloud-based smart access solution that offers managers and owners a convenient and secure way to control access, improving security across all types of residential properties.

We also expect to see a growing focus on mobile credentials as smartphones become increasingly ubiquitous, and we therefore expect the use of mobile credentials (e.g., NFC, Bluetooth) for access control to gain further traction. This aligns with our existing mobile app offerings and focuses on user convenience.

Thanks to SALTO’s BLUEnet Wireless technology, SALTO launched the wireless BLUEnet door controller series that provides a smarter and more flexible alternative to traditional access controllers. There is no need to replace wiring, which reduces installation expenses. Its universal SALTO compatibility allows it to seamlessly integrate with any access point designed to manage automatic door systems and access point connections (input/output), which optimises cabling. SALTO’s BLUEnet Wireless online and SVN-Flex capabilities deliver cost-efficient access control that extends security to non-door openings and doors that would otherwise be too difficult or expensive to secure.

SALTO provides a range of wireless electronic access control devices that will become the norm by replacing the conventional controller-based wired access control in some cases, providing more flexibility and cost savings on installation, cabling, and unwanted routing.

Andrew Levell Smith.

Andrew Levell Smith, Senior Product Manager, Regal Distributors SA

The current trends in access control are moving towards a more integrated and secure approach. This includes the convergence of physical and cyber security, implementing a zero-trust model, and using AI and machine learning to manage and analyse access rights and trends. This allows for dynamic adaptation of threat levels and access policies.

Hybrid management models are being used, including Access Control as a Service (ACaaS) and on-premises solutions. Mobile credentials are becoming more prevalent, with mobile phones or wearable devices used for access control. Multi-factor authentication is also being implemented, requiring multiple forms of identification for access control, such as face recognition and licence plate recognition (LPR).

System amalgamation or unification is another key trend, integrating various systems for a more streamlined approach.

In summary, access control is evolving from a balance between convenience and security to a model that is both convenient and secure. This is achieved by unifying physical, logical, and cybersecurity models, allowing for access anytime, anywhere, by anyone, under a zero-trust model.

Johlene Selemela.

Johlene Selemela, Public Relations Officer, ZKTeco South Africa

In 2024, the access and identity management landscapes will witness several transformative trends that shape the way individuals interact with digital systems, with ZKTeco at the forefront of biometric technology. The significant transformations driven by emerging technologies and evolving security needs, have pushed organisations beyond traditional security measures.

There is a growing emphasis on biometric authentication methods, such as facial recognition and fingerprint scanning, to fortify access controls, contributing to a shift away from traditional password-based systems. Additionally, the integration of computer vision, artificial intelligence (AI), and machine learning is becoming more prevalent in access management, enabling organisations to proactively detect and respond to security threats by analysing user behaviour patterns.

The rise of passwordless authentication methods, like multi-factor authentication, is streamlining user experiences while fortifying defences against unauthorised access. Overall, the access and identity space in 2024 will be characterised by a harmonious blend of cutting-edge technologies and robust security measures. These trends collectively reflect a dynamic shift towards more robust, intelligent, and user-centric access and identity management solutions. It is all about ensuring that it is mart, safe, and easy for people to use.

Nicolas Garcia.

Nicolas Garcia, VP of Marketing & Sales Enablement, Smart Biometrics, IDEMIA

The top trend in 2024 will be contactless biometric technologies, AI, and cybersecurity.

1. Demand for facial recognition and contactless fingerprint solutions will continue to grow due to factors such as convenience, security, hygiene, and performance.

2. AI will have a growing importance in the market, especially as it helps boost performance even higher, and improve enrolment quality and identification capabilities. Neural Processing Units are used to multiply the processing power, while remaining affordable (like the VisionPass SP).

3. The need for cybersecurity will become stronger as criminals also use AI to boost their operations. This will be reflected in new regulations being passed worldwide, starting with North America and Europe with, for instance, the Cyber Resilience Act.

Due to the complexity of cybersecurity, manufacturers must do their bit and make securing the solution easier, and that is why IDEMIA now embeds ‘Security by Default’ in all its products. This ensures the right level of protection without hassle for the customer.


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Mines require proof of performance
Technews Publishing Mining (Industry)
The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment.

Optimising safety and security in mining
Gallagher Mining (Industry)
Mining operations are some of the most critical and hazardous industrial activities, with a range of risks. To address these, access control, and integrated security solutions are critically important in protecting people and assets.

From the Editor's Desk: Something old and something new
Technews Publishing News & Events
      Welcome to the 2024 edition of SMART Security Solutions’ Mining Handbook. Mining is a challenging industry for security professionals, although security is a challenge on this continent, no matter your ...

Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.