Identity management in West Africa

June 2019 News & Events, Access Control & Identity Management, Conferences & Events

Speaking after Securex West Africa 2019, Wisam Yaghmour, regional sales manager for Africa at HID Global, says HID has achieved a significant installed base across various verticals on the continent, such as the education, commercial, finance, mining and government verticals.

As to how biometric and mobile access is advancing, Yaghmour says that adoption is growing, “but they are not a replacement for the traditional card at the moment. They are rather a complementary technology when customers are looking for a secure technology that is mobile, free from any form factor and allows the application(s) to extend beyond physical access.”

As can be expected, he notes that on-premise access control is still the most widely used model. “We encourage customers to migrate to the cloud, however, every customer is unique and has different requirements and use cases.”

The credential question

The question of identity management in Africa is seen by many as one that is both far behind the times in certain places and on par with the latest developments in others. This is especially true when it comes to logical access.

Yaghmour says that traditional static passwords simply aren’t enough to protect against today’s dynamic threats. “Hackers continue to target the credentials of insiders because they give the attacker access to facilities and the network, enabling them to ‘look like they belong’, so they can move around the organisation undetected.”

“The issuance and management of user credentials, on all the various devices from smartcards to mobile phones, for all the applications and resources they want to access, can be a manual, time consuming process. What is needed is a single process with a consolidated user credential management system that can issue and manage security credentials for all users, granting them access to what is appropriate, from buildings to cloud-based applications, across various form factors.”

HID offers various identity management solutions, including:

• HID Global IAM products protect more than 85 million user identities worldwide.

• HID IdenTrust protects more than six billion payment transactions per year.

• HID Global Credential Management System has issued more than fifty million credentials to date.

And while many people are of the opinion that African businesses and governments are lacking in the cybersecurity field, Yaghmour says HID Global makes it possible to verify millions of identities every day. “When our customers implement the newest-generation technologies for trusted identities, the threat of cyber-attacks becomes less daunting, while greater peace of mind builds confidence for governments and organisations that put value on trust.”

With cyber threats coming in many different forms, HID approaches digital identity security in the following ways:

• Digital authentication: Securing digital identities with two-factor authentication and validating transactions via mobile authentication.

• Digital certificates: Securing the connections of things with a higher level of trust.

• Threat detection: Securing digital environments by automatically correlating complex threats across physical and cyber domains.

• E-government solutions: Securing electronic government-to-citizen IDs.

• ID issuance: Secure cloud-based services to issue people’s IDs.

• Mobile access: Securing the use of smartphones to open doors and access systems via cloud services.

• Cyber-physical: Securing access to facilities with protective mechanisms that satisfy stringent government requirements, protecting places from cyber breaches.

Naturally all these products were not on show at the event, but Yaghmour notes the following were among the various products highlighted to customers and potential customers in West Africa:

• Mobile access: Mobile access is the use of a mobile device (a smartphone, tablet or wearable) to gain access to secured doors, gates, networks, services and more. HID’s solutions allow organisations to meet the growing demands of a mobile-first world.

• HID biometric: The iCLASS SE RB25F fingerprint reader is part of HID Global’s line of biometric solutions for physical access control. Designed for two-factor authentication using fingerprint and/or high frequency credentials, the iCLASS SE RB25F offers performance and Seos support for securing high value doors.

• AC series: The ACW2-XN is designed to serve the needs of small facilities wanting to improve security and reduce business risk. Its ability to scale from one to 16 doors is ideal for offices, retail stores, small hotels and bed and breakfast establishments, factories, and more.

For more information contact HID Global, +27 60 988 2282, [email protected], www.hidglobal.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
IZI Group acquires G4S Cash Solutions South Africa
News & Events
IZI Africa, a sister company within the IZI Group, has acquired G4S Cash Solutions (SA) following the receipt of all necessary regulatory approvals. This transaction marks a significant consolidation in the South African cash handling industry.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Paxton cuts emissions by over a third
Paxton News & Events
Paxton has announced a significant reduction in its carbon footprint, cutting emissions by 961 tonnes of CO2e in its 2023 second reporting year.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.