2024 State of Security Report

April 2024 Editor's Choice

HID has published its 2024 State of the Security Industry Report, which gathered responses from 2600 partners, end users, and security and IT personnel worldwide, across a range of job titles and organisation sizes representing over 11 industries.

The 2024 State of Security Report delves into the underlying concerns driving upcoming innovations and the technologies underpinning them, helping security leaders proactively adapt to evolving challenges. This year’s survey reveals six themes.

Mobile identity is expected to be ubiquitous

Given the widespread use of mobile devices, momentum continues to build around their use to support identity. Within the next five years, surveyed end users state that nearly 80% of organisations will deploy mobile IDs. Industry partners are even more optimistic, stating that 94% of their customers will have deployed mobile IDs.

MFA is widespread despite slow but growing implementation of Zero Trust

More than 83% of end user respondents said their organisation currently uses Multi-Factor Authentication (MFA), mainly due to the vulnerabilities of passwords. For many, this represents the first step on the longer journey toward Zero Trust, an approach to security that calls for organisations to maintain strict access controls and never to trust, always verify anyone – internal or external – by default.

According to the survey, Zero Trust has been implemented in 16% of organisations with over 100 000 employees and 14% in those with up to 10 000 employees.

With MFA being widespread, the eventual end of passwords is imminent. The creation of standards such as FIDO (Fast Identity Online), which uses “standard public key cryptography techniques to provide phishing-resistant authentication,” will pave the path to new and more secure authentication options that will be part of a more robust Zero Trust architecture.

Sustainability becomes a growing driver in business decisions

Among HID’s survey respondents, sustainability continues to rank high as a business priority, with end users and partners rating its importance at a 4 on a 1-to-5 scale. Additionally, 74% of end users indicate that the importance of sustainability has grown over the past year, and 80% of partners reported that the trend is growing in importance among their customers.

As such, there will likely be a continued emphasis on solutions that minimise energy use, reduce waste, and optimise resource usage. Shifting to cloud-based solutions and increasing the use of mobile devices are two clear strategies to reach these sustainability goals.

Biometrics continues its impressive momentum

In this year’s survey, 39% of installers and integrators said their customers use fingerprint or palm print, and 30% use facial recognition. The momentum continues to build as 8% plan to test or implement some form of biometrics in the next year, and 12% plan to do so in the next three to five years.

Identity management points up to the cloud

Nearly half of end users are moving to cloud-based identity management, with 24% already using it and another 24% in the process of implementing such systems. Industry partners say their customers face several hurdles here, including existing reliance on legacy/on-premises equipment (28%), lack of budget (24%), and cloud-based identities simply not being a business priority (21%).

The rise of artificial intelligence for analytics use cases

Conversations about AI have come to dominate the business landscape, and many security professionals see AI’s analytic capabilities as the low-hanging fruit to enhance identity management. Rather than looking to AI to inform the entirety of the security system, it is possible to leverage data analytics to operationalise AI in support of immediate outcomes. In this scenario, 35% of end users reported they will be testing or implementing some AI capability in the next three to five years, with 15% already using AI-enabled biometrics.

The full report includes additional global data and further analysis. Read it in its entirety here.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...