2024 State of Security Report

April 2024 Editor's Choice

HID has published its 2024 State of the Security Industry Report, which gathered responses from 2600 partners, end users, and security and IT personnel worldwide, across a range of job titles and organisation sizes representing over 11 industries.

The 2024 State of Security Report delves into the underlying concerns driving upcoming innovations and the technologies underpinning them, helping security leaders proactively adapt to evolving challenges. This year’s survey reveals six themes.

Mobile identity is expected to be ubiquitous

Given the widespread use of mobile devices, momentum continues to build around their use to support identity. Within the next five years, surveyed end users state that nearly 80% of organisations will deploy mobile IDs. Industry partners are even more optimistic, stating that 94% of their customers will have deployed mobile IDs.

MFA is widespread despite slow but growing implementation of Zero Trust

More than 83% of end user respondents said their organisation currently uses Multi-Factor Authentication (MFA), mainly due to the vulnerabilities of passwords. For many, this represents the first step on the longer journey toward Zero Trust, an approach to security that calls for organisations to maintain strict access controls and never to trust, always verify anyone – internal or external – by default.

According to the survey, Zero Trust has been implemented in 16% of organisations with over 100 000 employees and 14% in those with up to 10 000 employees.

With MFA being widespread, the eventual end of passwords is imminent. The creation of standards such as FIDO (Fast Identity Online), which uses “standard public key cryptography techniques to provide phishing-resistant authentication,” will pave the path to new and more secure authentication options that will be part of a more robust Zero Trust architecture.

Sustainability becomes a growing driver in business decisions

Among HID’s survey respondents, sustainability continues to rank high as a business priority, with end users and partners rating its importance at a 4 on a 1-to-5 scale. Additionally, 74% of end users indicate that the importance of sustainability has grown over the past year, and 80% of partners reported that the trend is growing in importance among their customers.

As such, there will likely be a continued emphasis on solutions that minimise energy use, reduce waste, and optimise resource usage. Shifting to cloud-based solutions and increasing the use of mobile devices are two clear strategies to reach these sustainability goals.

Biometrics continues its impressive momentum

In this year’s survey, 39% of installers and integrators said their customers use fingerprint or palm print, and 30% use facial recognition. The momentum continues to build as 8% plan to test or implement some form of biometrics in the next year, and 12% plan to do so in the next three to five years.

Identity management points up to the cloud

Nearly half of end users are moving to cloud-based identity management, with 24% already using it and another 24% in the process of implementing such systems. Industry partners say their customers face several hurdles here, including existing reliance on legacy/on-premises equipment (28%), lack of budget (24%), and cloud-based identities simply not being a business priority (21%).

The rise of artificial intelligence for analytics use cases

Conversations about AI have come to dominate the business landscape, and many security professionals see AI’s analytic capabilities as the low-hanging fruit to enhance identity management. Rather than looking to AI to inform the entirety of the security system, it is possible to leverage data analytics to operationalise AI in support of immediate outcomes. In this scenario, 35% of end users reported they will be testing or implementing some AI capability in the next three to five years, with 15% already using AI-enabled biometrics.

The full report includes additional global data and further analysis. Read it in its entirety here.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Local manufacturing is still on the rise
Hissco Editor's Choice News & Events Security Services & Risk Management
HISSCO International, Africa's largest manufacturer of security X-ray products, has recently secured a multi-continental contract to supply over 55 baggage X-ray screening systems in 10 countries.

NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

The future of digital identity in South Africa
Editor's Choice Access Control & Identity Management
When it comes to accessing essential services, such as national medical care, grants and the ability to vote in elections to shape national policy, a valid identity document is critical.

Do you need a virtual CIO?
Editor's Choice News & Events Infrastructure
If you have a CIO, rest assured that your competitors have noticed and will come knocking on their door sooner or later. A Virtual CIO service is a compelling solution for businesses navigating tough economic conditions.

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

AI enables security solutions to define business strategies
Regal Distributors SA Editor's Choice
While allowing technologies to do exactly what they should do with even more efficiency and precision, AI is also empowering these same technologies to break through their traditional boundaries and create an ecosystem where one interface delivers outcomes across highly segmented verticals.

Putting cyber into surveillance
Dallmeier Electronic Southern Africa Cathexis Technologies Technews Publishing Editor's Choice
Cybersecurity has become an essential part of the physical security industry. However, unlike other IoT technologies, of which security products are a part, surveillance technologies have more to protect.

Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.