IT Visionaries

Digitizing the New Age of Access Identity Management with HID Global’s Martin Ladstaetter


Listen Later

Security identity management comes in all shapes and sizes, and it’s an industry that continues to innovate at a rapid pace and there is no end in sight. Think of identity management like this: that card or fob you scan to enter an office or building, that’s security management. Or maybe the password you change every 30 days, that’s identity management. But while these processes seem simple and familiar, they haven’t been part of the security ecosystem for very long.

“15 years ago, phones were different. We didn't know about online identities. We didn't have digital passports. We were using batches to access buildings. If you fast forward, the pace of what we are changing is pretty traumatic and fast.”

Traumatic and fast are strong but appropriate words when describing the pace at which Martin Ladstaetter, and HID Global, are working at when it comes to making it easier for consumers to access their everyday necessities. On this episode of IT Visionaries, Martin, the Head of Consumer Authentication and VP of Product Management at HID Global, explains how the company is digitizing this new world and securing consumers across multiple networks. Martin also dives into the struggles enterprises are facing when it comes to securing distributed workforces and what the future of access identity management holds.

Main Takeaways

  • Creating an Unknown Digital Experience: Customer experience is key in any sector. In identity management, the key to a good experience is to make it not feel like an experience at all. The future of this space involves users being able to make purchases, access buildings and cars seamlessly, without having to use security cards or fobs or other devices.
  • Is This Ethical?: As distributed workforces rise in popularity, one of the hot discussion topics is how large enterprises should be securing their employees and what is the right line to toe when it comes to security procedures? You don’t want to be constantly monitoring an employee's actions, but at the same time you must make sure you protect sensitive data. Finding a good balance between security and privacy remains key.
  • Securing Against a Single Breakpoint: Every building has multiple entry and exit points — this is necessary in case of an emergency. Your technology should be built the same way, You have to secure your devices and technology against having a single breakpoint. That way, if a a card is deactivated, a phone system breaks down, or a password fails, employees and IT professionals have other ways to gain access.. 

IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform

 

-- 

Brightspot is the leading content management platform built for modern teams. Your content lifecycle - from ideation to archival - moves faster, handling any volume, variety, or velocity with ease. 

Unlike legacy platforms that demand heavy dev work and struggle with scale, Brightspot is user-friendly, endlessly customizable, and enterprise-ready. Think dynamic, modern experiences, shipped in minutes—not months. 

Trusted by some of the world’s leading tech organizations, Brightspot reduces total cost of ownership, boosts productivity, and gives you the governance, security, and performance your teams need. 

Visit brightspot.com/ITVisionaries to learn more.

---

This episode was produced by the team at Mission.org and brought to you by Brightspot.

...more
View all episodesView all episodes
Download on the App Store

IT VisionariesBy Mission

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

170 ratings


More shows like IT Visionaries

View all
HBR IdeaCast by Harvard Business Review

HBR IdeaCast

1,830 Listeners

Risky Business by Patrick Gray

Risky Business

365 Listeners

Daily Tech News Show by Tom Merritt

Daily Tech News Show

1,385 Listeners

Radical Personal Finance by Joshua Sheats

Radical Personal Finance

1,876 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,009 Listeners

Gartner ThinkCast by Gartner

Gartner ThinkCast

112 Listeners

Click Here by Recorded Future News

Click Here

412 Listeners

The Indicator from Planet Money by NPR

The Indicator from Planet Money

9,555 Listeners

The Story by Mission

The Story

238 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

166 Listeners

Mission Daily by Mission.org

Mission Daily

219 Listeners

Education Trends by Mission

Education Trends

40 Listeners

The Future of Cities by Mission

The Future of Cities

75 Listeners

Marketing Trends by Mission

Marketing Trends

276 Listeners

The Journey by Mission.org

The Journey

59 Listeners

Fiction - Comedy Fiction by The Sunset Explorers

Fiction - Comedy Fiction

6,447 Listeners

Find Your Mission by Mission

Find Your Mission

37 Listeners

The Prof G Pod with Scott Galloway by Vox Media Podcast Network

The Prof G Pod with Scott Galloway

5,312 Listeners

Hidden In Plain Sight by Mission

Hidden In Plain Sight

86 Listeners

Up Next In Commerce by Mission

Up Next In Commerce

136 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

127 Listeners

The Fleet by Mission

The Fleet

18 Listeners

Business X factors by Mission

Business X factors

23 Listeners

Life with Pets by Buddies by Blue Buffalo

Life with Pets

58 Listeners

HBR On Strategy by Harvard Business Review

HBR On Strategy

84 Listeners

HBR On Leadership by Harvard Business Review

HBR On Leadership

151 Listeners

Experts of Experience by Mission.org

Experts of Experience

20 Listeners

Prof G Markets by Vox Media Podcast Network

Prof G Markets

1,127 Listeners