Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April 8, 2019

Similar documents
Enabling Compliance for Physical and Cyber Security in Mobile Devices

iclass SE Platform Solutions The New Standard in Access Control

EXECUTIVE BRIEF. The Evolution of Cards and Credentials in Physical Access. In this Paper

HID Mobile Access. Simple. Secure. Smart.

Beyond Payment: Secure NFC applications and their relation to RFID

The Next Generation of Credential Technology

Improving the Student Experience with a Unified Credential. Jeff Staples VP Market Development Blackboard Transact

Empower your phone to open new doors

Cyber Security and You: The Future of Physical Access in a Digital World. Chip Epps & Daniel Bailin HID Global

Empower your phone to open new doors

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

NFC Identity and Access Control

Single Secure Credential to Access Facilities and IT Resources

NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit

Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans

DIGITAL TECHNOLOGY An Evolution in the Payment Landscape. AMEX Digital Solutions

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

Adopting Mobile Credentials Into Your Access Control Infrastructure

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar,

Enabling Compliance for Physical and Cyber Security in Mobile Devices. Chip Epps & Daniel Bailin HID Global

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

New Product Announcement: AC2000 v7.1 Integrations

NFC Service Launch in Hong Kong. Alex Kun SVP, Product Development and Management Wireless Business

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Natural Security Alliance

GSM Association (GSMA) Mobile Ticketing Initiative

Google Identity Services for work

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24

Smart Payments. Generating a seamless experience in a digital world.

How Next Generation Trusted Identities Can Help Transform Your Business

ASU s Innovative Spirit

HID goid Mobile ID Solution

MIFARE4MOBILE: the road TO NFC MASS ADOPTION. NFC WORLD CONGRESS Sophia Antipolis, 2011

Security Solutions for Mobile Users in the Workplace

HID Mobile Access Solution Overview

HCE security implications. Analyzing the security aspects of HCE

Webinar Tokenization 101

The Medeco Solution for Controlled Access and Accountability

Put Time Back on your Side

iclass Seos July 2014 Introducing the HID Global iclass Seos Card

New Product Announcement

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

State of US Mobile Payments (NFC)

Respond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys.

Authentication Technology for a Smart eid Infrastructure.

S700e Intelligent IP Reader S700 Exit Reader

An overview of. Mobile Testing. By André Jacobs. A Jacobs

Access Control: Trends for 2015

Will Mobile Phones Replace Cards?

HID goid Mobile ID Solution

SAMSUNG PAY FNB CONNECT WITH US. X Y a [ Your Hometown Bank

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

New Product Announcement. Flexible iosmart Card Readers and Cards

Powering the enterprise-grade mobile access experience.

february 2013 part 1 of 3

3. Why should I use Samsung Pay instead of my physical cards?

NFC in the PC environment

Zebra Link-OS Environment Version 2.0

Setting Up and Using Cardinal Visa with Apple Pay

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

The Device Has Left the Building

Student ID card and campus security solutions. Colleges and universities

Managing Devices and Corporate Data on ios

Secure Elements 101. Sree Swaminathan Director Product Development, First Data

Power LogOn s Features - Check List

Overcoming Objections to Smartphones as Your Credential

MICROSOFT (MS) INTUNE IOS/ANDROID DEVICE ENROLLMENT

EMERGING PAYMENTS. Breakout and Workshop

Choosing the Right Credentials Is Easier than You Think

Smart Ticketing The NFC Mobile ticketing solution

FACIAL RECOGNITION TERMINAL SYSTEM

BlackBerry Enterprise Identity

Who What Why

Mobile Banking App Guide (ios and Android Apps) Mobile Banking App Guide (ios and Android)

ACR1255U-J1 Secure Bluetooth NFC Reader

BRING MAC TO THE ENTERPRISE WITH A MODERN APPROACH TO MANAGEMENT

Mobile Security using IBM Endpoint Manager Mobile Device Management

Rev. C 8/16/2017. VP3300/VP3300C/VP3300E User Manual

The Future of Mobile Device Management

ios 12: Change these privacy and security settings now

WebSphere Puts Business In Motion. Put People In Motion With Mobile Apps

Respond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys.

Readers and credentials

THE CONVERGENCE OF PHYSICAL AND LOGICAL ACCESS: WHAT IT REALLY MEANS FOR AN ORGANIZATION S SECURITY

USER MANUAL Argo 2.0

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE

SETUP GUIDE INSTALLATION HANDBOOK. For Integrators, Installers and Administrators. Everything on how to get Kisi up and running. getkisi.

Overview. DigitalPersona Logon for Windows Data Sheet. DigitalPersona s Composite Authentication transforms

Mobile NFC Services Opportunities & Challenges. NGUYEN Anh Ton VNTelecom Conference 31/10/2010

Mobile Banking with Mobile Deposit FAQs

Bridging Identity Islands with Continuous, Contextual Identity Assurance

Dr. Jassine Boulkheir International Sales and Marketing Manager

How to Align Information Security and Safety in Healthcare

Solution. Imagine... a New World of Authentication.

Apple Pay - Frequently Asked Questions

ANZ FASTPAY USER GUIDE

Mobile Contactless Technology Backgrounder

Transcription:

Powering the trusted identities of the world s people, places & things Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April 8, 2019

Do You Remember the First Time You Saw This?

It's a New World

Credential Requirements Security Applications Mobility Agenda The Status Quo Selecting the Right Credential Solution Mobile Access How to Upgrade

The Status Quo - Vulnerabilities NACCU 2018 Campus Profile Summary Report

The Status Quo - Vulnerabilities On secure smart cards: Unencrypted Card Serial Number Poor key management Unencrypted data payload Identifier marked on the credential Open, untracked format Reader configuration supporting legacy technology Unencrypted communication from reader to panel

The Status Quo Limited Multi-Application CSN: 123456789

The Status Quo No Path to Mobile Most technologies deployed today do not provide a path to mobile access Reader infrastructure not capable of transition Common cross-platform credential model not considered

Mobile Devices Cards Disparate Cross-Platform Credential Models UID: 123456789 Reader Firmware Card ios App Android App ios ese Android ese Wearable 1

The Status Quo - Summary Vulnerabilities in Technology or Implementation Limited Multi-Application Support No Path to Mobile Access

Selecting the Right Credential Solution Security Applications Mobility

Selecting the Right Solution Security A Holistic, Secure Credential Program Lock the Back Door Remove the Weak Link Track the Format Keep Credential Number Private Strong defense has Layers The Key is Key Secure Technology is Foundational

Selecting the Right Solution - Applications Leverage technology that makes it possible to incorporate an increasing number of physical, logical, and extended applications: Building access Secure print authentication Time and attendance Cashless vending

Selecting the Right Solution - Mobility Evaluate solutions that offer the freedom to choose Device form factors - Card, Phone, Tablet, Wearable Semiconductor platforms - NXP, Infineon, EM Operating systems - ios, Android, Tizen Readers - Wall readers, Locks, USB readers, embedded devices Communications protocols - NFC, Bluetooth to address your future needs

Mobile Credentials The Next Frontier https://www.youtube.com/watch?v=hhvnr3nj2oa

Mobile Devices Cards Common Cross-Platform Credential Model UID:????????? Reader Firmware UID:?????????

Seos Credential Technology

HID Mobile Access Bringing the Magic Back to PACS

9 Years of Experience in a Dynamic Market Mifare4Mobile 1.0 is published. Only one card active simultaneously. Closed environment for managing credentials. Unusable specification NFC phones start to appear Slow uptake on NFC phones. Mobile operators struggle to launch SIM solutions NFC microsds and iphone sleeves are pushed in the market as bridge technologies BlackBerry starts working on an embedded SE solution with NFC Google wallet is launched on Google devices and embedded SE Samsung announces an embedded SE NFC solution with Visa. Basically no services have been launched Investigates SIM based NFC solutions. Blocks Google Wallet and embedded SE solutions Allegion tries iphone MIFARE sleeve, 3 years after ASSA ABLOY Mifare4Mobil e 2.0 is published. Only pilots exist Android 4.3 is released. Includes native support for Bluetooth Smart. Android 4.4 is released with NFC Host Card Emulation (HCE) Visa and Mastercard release specifications for payments with NFC Host Card Emulation (HCE) 2009 2010 2011 2012 2013 2014 Apple Pay is launched. Based on NFC and ese ASSA ABLOY develops SIM -based MIFARE solution ASSA ABLOY starts world s first SIM -based Hotel pilot ASSA ABLOY creates solution with MIFARE and bridge technologies Starwood tries the microsd and iphone Sleeve solution and dimisses them Arizona State University pilots microsds and iphone Sleeves with HID. Lack of native phone support ends the pilot A platform independant technology is needed to be future proof. Seos is launched HID tests an iclass solution with embedded Secure Elements on BackBerry 9900. Lack of support on other devices and that mobile opetators blocked the solution made it unsellable HID runs a several SIM basedseos pilots with different MNOs ASSA ABLOY starts integrating with leading handset manufacturer embedded SE solution. ASSA ABLOY creates HCE proofof- concept. We can now emulate Seos in software on Android NFC phones ASSA ABLOY creates a Seos over Bluetooth Smart solution, providing native support for Android and ios HID Mobile Acces

Integrated Architecture You Choose: HID User Interfaces Cloud API & App SDK Your App API PACS / IAMS HID Platform Mobile ID Credential Admin

HID Mobile Access Two Original Modes of Operation TAP TWIST Tap Twist & Go Like with prox cards

Android Wear & Apple Watch

Swipe Right Press Firmly Widget & 3-D Touch

Supported Devices List 250+ Devices

NFC vs. Bluetooth NFC Card Emulation Supported by iclass SE readers Short Range Tap only Performance similar to card Android only Bluetooth Supported by iclass SE readers Short & Long Range Tap, Twist & Go, Wearables, Widget, 3-D Touch Less consistent than card Android & ios 25

Apple June Announcement ASSA ABLOY will leverage its expertise in mobile access to support Apple s efforts to make it easier to access dorm rooms with contactless student IDs Nico Delvaux CEO; ASSA ABLOY

Mixed Populations Mobile Devices with Legacy Credentials

Benefits of Mobile Access More User Convenience Greater Operational Efficiency Higher Security

Benefits of Mobile Access More User Convenience: Enable building occupants to use smartphone, tablet, or wearable to enter controlled areas Fewer items to carry Lost or forgotten cards no longer a problem Remote, over-the-air credentialing Extended read range for special applications Adds to perception of innovative environment No online connectivity required; Background operation

Benefits of Mobile Access Greater Operational Efficiency: Make physical access administration easier with digital, online processes Physical credential management transforms to digital experience Over-the-air credentialing of remote workers and visitors Streamlined operations with easy integration to PACS, visitor management, and other systems Sustainable process with reduced waste and lower carbon footprint

Benefits of Mobile Access Higher Security: Provide higher levels of authentication Seos technology used to secure credential Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision unauthorized devices; revoke credentials over-the-air Applications can be protected with biometric and/or passcode Vulnerabilities can be addressed quickly through remote update

Common Concerns About Mobile Access Won t Work with Dead Battery No Visual Authentication of Identity

Simple and Free to Register https://managedservices.hidglobal.com/faces/mauseronboardingstart

How to Upgrade Steps to Upgrade Best Practices Cation Areas

Migration Options Pros/Cons Single Tech Cards Cost neutral credentials Reconfigure all readers More expensive readers Replace all credentials Multi Tech Cards Readers First Multi Tech Cards Credentials First Replace only remaining legacy credentials No reconfiguration of readers Less expensive readers Replace credentials only once Risk appropriate reader upgrades Reconfigure all readers More expensive readers More expensive credentials (temp) More expensive credentials

How to Upgrade Best Practices Site survey and complete inventory of existing technologies as a first step Support as few legacy technologies as possible Choose new solution capable of mobile access Build your own mobile app Start small execute successfully at one building, then repeat

How to Upgrade Caution Areas Don t procrastinate: Set target dates for completion Consider and manage performance expectations Use common, managed credential format Set expectation for reader hardware refresh cycle Validate service provider security assertions Ask about key management practices ISO27001 Certification

Invest in Solutions that Demonstrate Choice Supports: Cards and Mobile Devices Smartphones, Tablets, and Wearables Multiple Secure Element Hardware Platforms ios, Android, and Other operating systems NFC, Bluetooth, and beyond Independent of: Transaction System Access Control Host Reader/Credential service provider

For more information Brandon Arcement - barcement@hidglobal.com Brett St. Pierre - bstpierre@hidglobal.com