Identity management in West Africa

June 2019 News & Events, Access Control & Identity Management, Conferences & Events

Speaking after Securex West Africa 2019, Wisam Yaghmour, regional sales manager for Africa at HID Global, says HID has achieved a significant installed base across various verticals on the continent, such as the education, commercial, finance, mining and government verticals.

As to how biometric and mobile access is advancing, Yaghmour says that adoption is growing, “but they are not a replacement for the traditional card at the moment. They are rather a complementary technology when customers are looking for a secure technology that is mobile, free from any form factor and allows the application(s) to extend beyond physical access.”

As can be expected, he notes that on-premise access control is still the most widely used model. “We encourage customers to migrate to the cloud, however, every customer is unique and has different requirements and use cases.”

The credential question

The question of identity management in Africa is seen by many as one that is both far behind the times in certain places and on par with the latest developments in others. This is especially true when it comes to logical access.

Yaghmour says that traditional static passwords simply aren’t enough to protect against today’s dynamic threats. “Hackers continue to target the credentials of insiders because they give the attacker access to facilities and the network, enabling them to ‘look like they belong’, so they can move around the organisation undetected.”

“The issuance and management of user credentials, on all the various devices from smartcards to mobile phones, for all the applications and resources they want to access, can be a manual, time consuming process. What is needed is a single process with a consolidated user credential management system that can issue and manage security credentials for all users, granting them access to what is appropriate, from buildings to cloud-based applications, across various form factors.”

HID offers various identity management solutions, including:

• HID Global IAM products protect more than 85 million user identities worldwide.

• HID IdenTrust protects more than six billion payment transactions per year.

• HID Global Credential Management System has issued more than fifty million credentials to date.

And while many people are of the opinion that African businesses and governments are lacking in the cybersecurity field, Yaghmour says HID Global makes it possible to verify millions of identities every day. “When our customers implement the newest-generation technologies for trusted identities, the threat of cyber-attacks becomes less daunting, while greater peace of mind builds confidence for governments and organisations that put value on trust.”

With cyber threats coming in many different forms, HID approaches digital identity security in the following ways:

• Digital authentication: Securing digital identities with two-factor authentication and validating transactions via mobile authentication.

• Digital certificates: Securing the connections of things with a higher level of trust.

• Threat detection: Securing digital environments by automatically correlating complex threats across physical and cyber domains.

• E-government solutions: Securing electronic government-to-citizen IDs.

• ID issuance: Secure cloud-based services to issue people’s IDs.

• Mobile access: Securing the use of smartphones to open doors and access systems via cloud services.

• Cyber-physical: Securing access to facilities with protective mechanisms that satisfy stringent government requirements, protecting places from cyber breaches.

Naturally all these products were not on show at the event, but Yaghmour notes the following were among the various products highlighted to customers and potential customers in West Africa:

• Mobile access: Mobile access is the use of a mobile device (a smartphone, tablet or wearable) to gain access to secured doors, gates, networks, services and more. HID’s solutions allow organisations to meet the growing demands of a mobile-first world.

• HID biometric: The iCLASS SE RB25F fingerprint reader is part of HID Global’s line of biometric solutions for physical access control. Designed for two-factor authentication using fingerprint and/or high frequency credentials, the iCLASS SE RB25F offers performance and Seos support for securing high value doors.

• AC series: The ACW2-XN is designed to serve the needs of small facilities wanting to improve security and reduce business risk. Its ability to scale from one to 16 doors is ideal for offices, retail stores, small hotels and bed and breakfast establishments, factories, and more.

For more information contact HID Global, +27 60 988 2282, [email protected], www.hidglobal.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Nice unveils MyNice Smartgo
News & Events Access Control & Identity Management
Nice SA has announced the release of MyNice Smartgo, a compact access automation solution, designed specifically for the South African market, combining an easy-to-install device with a user-friendly smartphone application.friendly smartphone application.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
SA businesses embrace GenAI, but strategy and skills lag
News & Events AI & Data Analytics
South African enterprises are rapidly integrating Generative AI (GenAI) into their operations, but most are doing so without formal strategies, dedicated leadership, or the infrastructure required to maximise value and minimise risk.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
ISPA’s take-down process protects from local scams
News & Events Information Security
During the recent school holidays, parents could rest a little easier knowing that ISPA, SA’s official internet industry representative body, is removing an average of three to four problematic websites from the local internet every week.

Read more...
The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Bosch Security renamed Keenfinity
News & Events
Globally renowned brands for video systems, access control and intrusion alarm systems, as well as communication systems, unite under the roof of the new company Keenfinity Group.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.