Access & identity expectations for 2024

SMART Access & Identity 2024 Editor's Choice, Access Control & Identity Management, Information Security, AI & Data Analytics

What does 2024 have in store for the access and identity industry? According to the participants in our round table, 2023 was a challenging year for the industry, but a good year as things eventually got back to normal after the pandemic panic. Does that bode well for the year ahead?

Will the economy keep crawling along, or can we expect problems, given the political and social challenges here and globally? Are end users ready to adopt the latest technology and extend the value of identity to other areas of the business world, or are we stuck opening doors? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Tarryn Fortune.

Tarryn Fortune, Inland Business Development Manager, Gallagher Security

Over several months, the Gallagher marketing and research teams surveyed end users, channel partners and consultants worldwide to discover what is on the horizon for 2024 and the emerging trends impacting businesses and their security priorities. The security industry has been moving toward a digital change for years, and from what we have learned from our channels across the globe, that change is about to take off. The year 2024 will be a year of escalating transition.

Gallagher is focused on the following topics for 2024:

• How cybersecurity is affecting budgets and spending going into 2024.

• The key integrations end users are prioritising.

• How businesses are dealing with staffing and skills shortages.

• Why are end users and channel partners at odds with cloud deployment?

• How data reporting is changing how businesses use security systems.

There is an increasing recognition by channel partners that transitioning to cloud-based solutions is inevitable, but end users are slower to prioritise their adoption. Those who plan to deploy cloud solutions anticipate incorporating them as part of a hybrid deployment strategy with their organisational systems, with minority planning on an all-cloud environment.

With a wealth of data at their fingertips, end users are beginning to see the operational benefits hidden within their security data; however, many cite the complexities and time consumption of data collation as significant barriers to extracting trends and insights. There is a growing need for a ‘single pane of glass’ approach to simplify security data management, and many users are hoping AI tools will help speed up the process and reduce the burden on human resources in the near future.

There is a real and growing need in the market for the collation, reporting, and analysis of data to aid in decision-making, identification of trends and anomalies, and predictions of vulnerabilities within organisations.

Surveillance is the top integration priority for end users who repeatedly identify video as the most needed addition to their current system, with plans to invest in these solutions now and into the year.

Lumard Groenewald.

Lumard Groenewald BDM SALTO Systems Africa

As SALTO Systems is synonymous with innovative solutions, we expect some of our existing product platforms to grow an even stronger market presence with exciting new additions to feature in 2024.

The continued widespread shift to cloud-based access control with cloud-based systems’ convenience, scalability, and cost-effectiveness is driving adoption across various sectors. SALTO will likely see this trend continue, leading to increased demand for its cloud-based access control solutions. SALTO Homelok is SALTO’s new cloud-based smart access solution that offers managers and owners a convenient and secure way to control access, improving security across all types of residential properties.

We also expect to see a growing focus on mobile credentials as smartphones become increasingly ubiquitous, and we therefore expect the use of mobile credentials (e.g., NFC, Bluetooth) for access control to gain further traction. This aligns with our existing mobile app offerings and focuses on user convenience.

Thanks to SALTO’s BLUEnet Wireless technology, SALTO launched the wireless BLUEnet door controller series that provides a smarter and more flexible alternative to traditional access controllers. There is no need to replace wiring, which reduces installation expenses. Its universal SALTO compatibility allows it to seamlessly integrate with any access point designed to manage automatic door systems and access point connections (input/output), which optimises cabling. SALTO’s BLUEnet Wireless online and SVN-Flex capabilities deliver cost-efficient access control that extends security to non-door openings and doors that would otherwise be too difficult or expensive to secure.

SALTO provides a range of wireless electronic access control devices that will become the norm by replacing the conventional controller-based wired access control in some cases, providing more flexibility and cost savings on installation, cabling, and unwanted routing.

Andrew Levell Smith.

Andrew Levell Smith, Senior Product Manager, Regal Distributors SA

The current trends in access control are moving towards a more integrated and secure approach. This includes the convergence of physical and cyber security, implementing a zero-trust model, and using AI and machine learning to manage and analyse access rights and trends. This allows for dynamic adaptation of threat levels and access policies.

Hybrid management models are being used, including Access Control as a Service (ACaaS) and on-premises solutions. Mobile credentials are becoming more prevalent, with mobile phones or wearable devices used for access control. Multi-factor authentication is also being implemented, requiring multiple forms of identification for access control, such as face recognition and licence plate recognition (LPR).

System amalgamation or unification is another key trend, integrating various systems for a more streamlined approach.

In summary, access control is evolving from a balance between convenience and security to a model that is both convenient and secure. This is achieved by unifying physical, logical, and cybersecurity models, allowing for access anytime, anywhere, by anyone, under a zero-trust model.

Johlene Selemela.

Johlene Selemela, Public Relations Officer, ZKTeco South Africa

In 2024, the access and identity management landscapes will witness several transformative trends that shape the way individuals interact with digital systems, with ZKTeco at the forefront of biometric technology. The significant transformations driven by emerging technologies and evolving security needs, have pushed organisations beyond traditional security measures.

There is a growing emphasis on biometric authentication methods, such as facial recognition and fingerprint scanning, to fortify access controls, contributing to a shift away from traditional password-based systems. Additionally, the integration of computer vision, artificial intelligence (AI), and machine learning is becoming more prevalent in access management, enabling organisations to proactively detect and respond to security threats by analysing user behaviour patterns.

The rise of passwordless authentication methods, like multi-factor authentication, is streamlining user experiences while fortifying defences against unauthorised access. Overall, the access and identity space in 2024 will be characterised by a harmonious blend of cutting-edge technologies and robust security measures. These trends collectively reflect a dynamic shift towards more robust, intelligent, and user-centric access and identity management solutions. It is all about ensuring that it is mart, safe, and easy for people to use.

Nicolas Garcia.

Nicolas Garcia, VP of Marketing & Sales Enablement, Smart Biometrics, IDEMIA

The top trend in 2024 will be contactless biometric technologies, AI, and cybersecurity.

1. Demand for facial recognition and contactless fingerprint solutions will continue to grow due to factors such as convenience, security, hygiene, and performance.

2. AI will have a growing importance in the market, especially as it helps boost performance even higher, and improve enrolment quality and identification capabilities. Neural Processing Units are used to multiply the processing power, while remaining affordable (like the VisionPass SP).

3. The need for cybersecurity will become stronger as criminals also use AI to boost their operations. This will be reflected in new regulations being passed worldwide, starting with North America and Europe with, for instance, the Cyber Resilience Act.

Due to the complexity of cybersecurity, manufacturers must do their bit and make securing the solution easier, and that is why IDEMIA now embeds ‘Security by Default’ in all its products. This ensures the right level of protection without hassle for the customer.


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

From the editor's desk: AI and events
Technews Publishing News & Events
      Welcome to the 2024 edition of the SMART Surveillance Handbook. Reading through this issue will demonstrate that AI has undoubtedly made its mark on the surveillance industry. Like ‘traditional’ video ...

Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Surveillance on the edge
Axis Communications SA Guardian Eye Technews Publishing Surveillance
Edge processing, a practical solution that has been available for some time, has proven its utility in various scenarios, tailored to the unique requirements of each user.

Artificial intelligence on the edge
Axis Communications SA Surveillance AI & Data Analytics
In the world of video surveillance, one of the primary benefits of edge computing will be the ability to undertake advanced analytics using artificial intelligence (AI) and deep learning within cameras themselves.

AI developments in surveillance
DeepAlert Secutel Technologies Technews Publishing Surveillance
When AI-powered video analytics first emerged in the surveillance market, it was heralded as a game-changer, promising near-magical object recognition and identification. As always, it was oversold, but times have changed and we are close to seeing the ‘magic’ at work.

AI enables security solutions to define business strategies
Regal Distributors SA Editor's Choice
While allowing technologies to do exactly what they should do with even more efficiency and precision, AI is also empowering these same technologies to break through their traditional boundaries and create an ecosystem where one interface delivers outcomes across highly segmented verticals.

Putting cyber into surveillance
Dallmeier Electronic Southern Africa Cathexis Technologies Technews Publishing Editor's Choice
Cybersecurity has become an essential part of the physical security industry. However, unlike other IoT technologies, of which security products are a part, surveillance technologies have more to protect.

Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.