This is a pivotal moment for enterprise security. As building and business systems become increasingly networked, organizations are better positioned than ever to make use of that connectedness to deliver smarter, safer workplaces. And as they look for ways to take maximum advantage of the opportunities, a growing number of companies are turning to identity-based technologies.
Identity-based technologies such as mobile credentialing, biometrics and wearables can help close existing security gaps through efficient access control and by offering unprecedented visibility into who’s in the building and where. Yet these technologies also have the potential to introduce new vulnerabilities. Every device that’s connected wirelessly within the workplace creates another point of access to the company’s network. And therein lays the challenge for most organizations: How to take advantage of these security-strengthening technologies without inviting unnecessary risk that could lead to a security breach. No technology is infallible. But a well-designed, documented and comprehensive plan that takes advantage of the latest technologies can make an organization less of a target. It may also help to reduce liability in the wake of a worst-case scenario.
The challenge for organizations is to balance the benefits of introducing security-strengthening, identity-based technologies with their potential to introduce new security vulnerabilities. By properly evaluating security needs, evaluating potential weaknesses and focusing on clear goals, security teams can take effective steps to minimize the risk and maximize the benefits of implementing identity-based access controls.