Identity management in West Africa

June 2019 News & Events, Access Control & Identity Management, Conferences & Events

Speaking after Securex West Africa 2019, Wisam Yaghmour, regional sales manager for Africa at HID Global, says HID has achieved a significant installed base across various verticals on the continent, such as the education, commercial, finance, mining and government verticals.

As to how biometric and mobile access is advancing, Yaghmour says that adoption is growing, “but they are not a replacement for the traditional card at the moment. They are rather a complementary technology when customers are looking for a secure technology that is mobile, free from any form factor and allows the application(s) to extend beyond physical access.”

As can be expected, he notes that on-premise access control is still the most widely used model. “We encourage customers to migrate to the cloud, however, every customer is unique and has different requirements and use cases.”

The credential question

The question of identity management in Africa is seen by many as one that is both far behind the times in certain places and on par with the latest developments in others. This is especially true when it comes to logical access.

Yaghmour says that traditional static passwords simply aren’t enough to protect against today’s dynamic threats. “Hackers continue to target the credentials of insiders because they give the attacker access to facilities and the network, enabling them to ‘look like they belong’, so they can move around the organisation undetected.”

“The issuance and management of user credentials, on all the various devices from smartcards to mobile phones, for all the applications and resources they want to access, can be a manual, time consuming process. What is needed is a single process with a consolidated user credential management system that can issue and manage security credentials for all users, granting them access to what is appropriate, from buildings to cloud-based applications, across various form factors.”

HID offers various identity management solutions, including:

• HID Global IAM products protect more than 85 million user identities worldwide.

• HID IdenTrust protects more than six billion payment transactions per year.

• HID Global Credential Management System has issued more than fifty million credentials to date.

And while many people are of the opinion that African businesses and governments are lacking in the cybersecurity field, Yaghmour says HID Global makes it possible to verify millions of identities every day. “When our customers implement the newest-generation technologies for trusted identities, the threat of cyber-attacks becomes less daunting, while greater peace of mind builds confidence for governments and organisations that put value on trust.”

With cyber threats coming in many different forms, HID approaches digital identity security in the following ways:

• Digital authentication: Securing digital identities with two-factor authentication and validating transactions via mobile authentication.

• Digital certificates: Securing the connections of things with a higher level of trust.

• Threat detection: Securing digital environments by automatically correlating complex threats across physical and cyber domains.

• E-government solutions: Securing electronic government-to-citizen IDs.

• ID issuance: Secure cloud-based services to issue people’s IDs.

• Mobile access: Securing the use of smartphones to open doors and access systems via cloud services.

• Cyber-physical: Securing access to facilities with protective mechanisms that satisfy stringent government requirements, protecting places from cyber breaches.

Naturally all these products were not on show at the event, but Yaghmour notes the following were among the various products highlighted to customers and potential customers in West Africa:

• Mobile access: Mobile access is the use of a mobile device (a smartphone, tablet or wearable) to gain access to secured doors, gates, networks, services and more. HID’s solutions allow organisations to meet the growing demands of a mobile-first world.

• HID biometric: The iCLASS SE RB25F fingerprint reader is part of HID Global’s line of biometric solutions for physical access control. Designed for two-factor authentication using fingerprint and/or high frequency credentials, the iCLASS SE RB25F offers performance and Seos support for securing high value doors.

• AC series: The ACW2-XN is designed to serve the needs of small facilities wanting to improve security and reduce business risk. Its ability to scale from one to 16 doors is ideal for offices, retail stores, small hotels and bed and breakfast establishments, factories, and more.

For more information contact HID Global, +27 60 988 2282, rtruter@hidglobal.com, www.hidglobal.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
DeepAlert appoints Howard Harrison as CEO
DeepAlert News & Events AI & Data Analytics
DeepAlert has appointed Howard Harrison as chief executive officer. DeepAlert’s founder and CEO of the past six years, Dr Jasper Horrell, will transition into a newly created role as chief innovation officer.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.