IT Visionaries

Digitizing the New Age of Access Identity Management with HID Global’s Martin Ladstaetter


Listen Later

Security identity management comes in all shapes and sizes, and it’s an industry that continues to innovate at a rapid pace and there is no end in sight. Think of identity management like this: that card or fob you scan to enter an office or building, that’s security management. Or maybe the password you change every 30 days, that’s identity management. But while these processes seem simple and familiar, they haven’t been part of the security ecosystem for very long.

“15 years ago, phones were different. We didn't know about online identities. We didn't have digital passports. We were using batches to access buildings. If you fast forward, the pace of what we are changing is pretty traumatic and fast.”

Traumatic and fast are strong but appropriate words when describing the pace at which Martin Ladstaetter, and HID Global, are working at when it comes to making it easier for consumers to access their everyday necessities. On this episode of IT Visionaries, Martin, the Head of Consumer Authentication and VP of Product Management at HID Global, explains how the company is digitizing this new world and securing consumers across multiple networks. Martin also dives into the struggles enterprises are facing when it comes to securing distributed workforces and what the future of access identity management holds.

Main Takeaways

  • Creating an Unknown Digital Experience: Customer experience is key in any sector. In identity management, the key to a good experience is to make it not feel like an experience at all. The future of this space involves users being able to make purchases, access buildings and cars seamlessly, without having to use security cards or fobs or other devices.
  • Is This Ethical?: As distributed workforces rise in popularity, one of the hot discussion topics is how large enterprises should be securing their employees and what is the right line to toe when it comes to security procedures? You don’t want to be constantly monitoring an employee's actions, but at the same time you must make sure you protect sensitive data. Finding a good balance between security and privacy remains key.
  • Securing Against a Single Breakpoint: Every building has multiple entry and exit points — this is necessary in case of an emergency. Your technology should be built the same way, You have to secure your devices and technology against having a single breakpoint. That way, if a a card is deactivated, a phone system breaks down, or a password fails, employees and IT professionals have other ways to gain access.. 

IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform

 

...more
View all episodesView all episodes
Download on the App Store

IT VisionariesBy Mission

  • 4.5
  • 4.5
  • 4.5
  • 4.5
  • 4.5

4.5

170 ratings


More shows like IT Visionaries

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,962 Listeners

Risky Business by Patrick Gray

Risky Business

362 Listeners

Daily Tech News Show by Tom Merritt

Daily Tech News Show

1,382 Listeners

Software Engineering Daily by Software Engineering Daily

Software Engineering Daily

628 Listeners

AWS Podcast by Amazon Web Services

AWS Podcast

200 Listeners

Gartner ThinkCast by Gartner

Gartner ThinkCast

107 Listeners

NVIDIA AI Podcast by NVIDIA

NVIDIA AI Podcast

324 Listeners

Smashing Security by Graham Cluley & Carole Theriault

Smashing Security

314 Listeners

Malicious Life by Malicious Life

Malicious Life

925 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,811 Listeners

The Story by Mission

The Story

238 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

161 Listeners

Mission Daily by Mission.org

Mission Daily

219 Listeners

Hacking Humans by N2K Networks

Hacking Humans

312 Listeners

Practical AI by Practical AI LLC

Practical AI

190 Listeners

Education Trends by Mission

Education Trends

40 Listeners

The Future of Cities by Mission

The Future of Cities

75 Listeners

Marketing Trends by Mission

Marketing Trends

277 Listeners

The Journey by Mission.org

The Journey

59 Listeners

Find Your Mission by Mission

Find Your Mission

37 Listeners

Hidden In Plain Sight by Mission

Hidden In Plain Sight

86 Listeners

Up Next In Commerce by Mission

Up Next In Commerce

136 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

119 Listeners

The Fleet by Mission

The Fleet

18 Listeners

Business X factors by Mission

Business X factors

23 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

33 Listeners

Life with Pets by Buddies by Blue Buffalo

Life with Pets

57 Listeners

Experts of Experience by Mission.org

Experts of Experience

20 Listeners