Press release -

Six themes drive identity management in 2016

For neXus, the leading global provider of security solutions and services, identity management will be one of the central issues in the context of IT security in 2016. The trends such as continuous flexibilization in the working environment, new forms of customer communication and the growing number of cyber-attacks are responsible for this.

Digital transformation opens up new perspectives for companies as well as for authorities: it optimizes their processes and thus liberates internal capacity, lowers their costs, uses new channels for dialogue with customers and citizens and makes their production more flexible. However, to ensure the security of the underlying processes, consistent and reliable identity management is essential. This year, the following trends will be driving particularly strong demand for appropriate solutions in 2016:

  • Cyber-attacks: The number of cyber-attacks is growing constantly, and they are becoming more sophisticated and complex. For the German economy alone, the financial loss is estimated at 50 billion euros per year. Data thefts of giant proportions around the globe continue to make headlines; in addition to this, progressive networking and digitalisation brings with it the considerable risk that a company’s entire knowledge could be stolen or destroyed in one fell swoop. As it is, many companies do not notice manipulation of their systems - or only when it is too late. Therefore, in addition to natural persons, all objects or resources that "communicate" as part of a network (for example, servers, applications, machines, mobile devices) also require an unambiguous identity in order to identify themselves as secure and trusted components and sources. In addition, it is necessary to protect the digital channel from outside attacks using encryption.
  • Industry 4.0 / Internet of things: The fusion of traditional industries in the IT industry under the label 4.0 / IoT forces the number of identities to skyrocket (see above). If manufacturing companies want to safeguard their processes, they must all be unequivocally defined, able to prove their identity and managed efficiently. At the same time, companies must also regulate physical access to machines as well as to all production areas clearly and safely in order to eliminate manipulation risks.
  • Flexibilization of the work environment: Our working environment has become increasingly flexible in recent years; cooperation with service providers and freelancers, project work, as well as flexible working hours for one’s own employees have long been part of everyday life. More and more employees also log into their employer’s systems via mobile devices. Clear rules for access to data and systems and establishing their technical requirements are essential in this context.
  • New digital business models: For an increasing number of companies, Big Data is a coveted resource, and this no longer includes only the well-known Internet giants. Concepts such as "connected cars" change the relationship between provider and user and an increasing number of companies are developing new concepts for direct contact with clients via digital channels only. Without reliable management of identities and authorizations, such business models will die in the bud.
  • Growing awareness of security risks in the public sector: The public sector in particular is affected by cyber-attacks. For quite some time now, the Internet has not
  • only been the scene of economic crime, but also the battle arena for political and

    terrorist targets. According to the Cyber Security Council Germany, around 150 countries possess or are developing offensive or defensive digital weapons. Awareness of safety risks and the willingness to invest has risen in the public sector; solutions for comprehensive identity management are thereby increasingly viewed as an integral part of a broader IT security strategy.

  • Critical infrastructure protection: Terrorist attacks and natural disasters as well as system failures such as Fukushima have strengthened awareness of the vulnerability of the so-called critical infrastructure. These include organizations and institutions that are of central importance to the functioning of the community, such as energy providers, DB Rail and the big banks. Legislature already prescribes a safety audit every two years for these systemically important organizations and obliges them to continuously optimize their security infrastructure. The growing interdependence of individual sectors and the use of IT technologies (keyword smart grids) requires even more comprehensive and modern safeguards for the future.
  • Companies from virtually all industries as well as authorities must therefore develop greater sensitivity toward security issues, if they do not want to compromise their business models and really want to take advantage of the potential of digitization - and they have to follow this awareness with both action and investment. "Companies and government institutions should consider IT security to be an asset that secures their own business models for the future and thus also creates reputation among the target groups," comments Bernd Dieckmann, Managing Director of neXus.

    neXus advises and develops flexible security solutions for businesses in many industries as well as government agencies and is well equipped with its portfolio of solutions that are ideal for meeting current demand in the market. The company offers a cross-industry centralized system for identity and access management with uniform guidelines for managing identities, credentials and authorizations, as well as maximum protection in the face of increasing digitization of processes.

    #dynamicid

    Topics

    • Data, Telecom, IT

    Regions

    • England

    neXus

    neXus is a leading international provider of security solutions and services, within both physical and logical access. A comprehensive end-to-end offering makes neXus the ideal one-stop Identity and Access Management provider. neXus has its headquarter in Stockholm and branches in Germany, Sweden, Norway, Denmark, France, India, US and the UK.

    For more information, please visit nexusgroup.com.

    Contacts

    Related content

    • neXus appoints new CFO

      Magnus Karlsson joins neXus as CFO on February 22, 2016, becoming a new member of the group management. Magnus succeeds Björn Johansson, who has decided to seek new challenges outside the group after nine years with neXus.

    • neXus supplies service card solutions to municipality of Ale

      Municipality of Ale has negotiated a solution for the production and administration of service cards for all its employees. The management of the municipality wanted all personnel to have secure identification that could also be used for secure login, and for access, print-on-demand etc.

    • Carolen Ytander new CMO for neXus

      neXus is boosting its company management by recruiting Carolen Ytander to head up marketing, communications and strategic HR. Carolen most recently worked at Vattenfall, where she held a number of executive positions, including Head of Nordic Marketing.

    • neXus strengthens focus on Nordics – recruits Marcus Persson from Atea

      neXus now further strengthens its focus on the Nordic market by recruiting Marcus Persson as new regional manager for the company in the Nordics. Marcus comes from Atea where he has had several managerial positions and most recently been responsible for Atea’s business agreements in Sweden.

    • Kristinehamn Municipality boosts security with dynamic identity management

      Many municipal employees handle sensitive data, including within school administration and healthcare. The neXus dynamic platform for physical and digital identity management gives the municipality complete control over who is on the premises and access to the computer network. The solution also ensures that the municipality can easily control which users are authorized for which information.

    • Best Practice for Banks

      On February 12, 2016, the German financial magazine gi geldinstitute published an article about the importance of identity management for banks.

    • Magnus Malmström as Director Software

      Magnus Malmström assumed the role as Director Software at neXus in May 2016. Magnus Malmström has nearly 15 years of experience in Product Management and Product Marketing positions within mobility and secure identities.

    • The SCIM standards just grew up to become RFC's

      Integrity and simplicity for both users and IT-departments just took a huge step forward on the Internet. The SCIM specifications, System for Cross-Domain Identity Management, are now published as publications by the Internet Engineering Taskforce (IETF) as RFC7643 and RFC7644. At neXus we are super proud because we have been playing a key part of the specifications.

    • The Hacked Jeep is not alone

      A recent article in Wired shows how the threat is real and even though causing accidents might not be the prime target it points out that we need to take what we have learnt when opening up systems and API to the IoT world and not just care about remote access to IoT, its also about how different objects in the near perimeter act and are authorized to act.

    • The IETF #93 meeting is wrapping up and it was a great week

       An very intensive Internet Engineering Task Force (IETF) week in Prague is just winding down. It’s been a great week in warm and welcoming Prague. IETF works on the specifications that together form the Internet and IETF attendees meets three times a year to try to make the internet, slowly but consistently, a better place. The gathering consists of quick presentations and long discussions in

    • Mobile app authentication by using Hybrid Access Gateway

      Traditionally authentication in mobile apps is not much different from authentication in web applications. However there are some key differences in mobile apps
      The UI is not build up on the server side so any changes to the UI (e.g. new authentication methods) requires new version of the application to be deployed. These kinds of things take time and focus from the actual app development. For

    • Identities without borders

      ​Imagine using your Swedish electronic signature for applying for a building permit for your summer home in Spain? It can soon turn into reality as the new EU regulation eIDAS is being introduced across Europe, enabling national electronic signatures to work across borders in the union.

    • Securing banking solutions

      ​How can neXus help securing banking solutions for authentication, verification and signatures for the next generation of banking services? Meeting and attracting new customers in a disruptive banking market thru new mobile channels is a big challenge!

    • You need a CISO, now!

      You need to have a chief security officer. There are no room for excuses anymore. And lots of companies have introduced it, calling it CISO, Chief Risk Officer or Data Security Officer for example.

    • Go out and play

      The number of connected devices is expected to exceed 20 billion by 2020. At the same time McKinsey estimates that faulty cybersecurity solutions related to this will cost organizations more than 3 trillion dollars by the same year.

    • Growing demand for digital signatures

      Do you remember when you were young and could sit for hours and practice your signature? You twirled the “M” and dotted the “I” with special care.
      Paper based signatures have always played a key role in organizing relations between people and entities in our society. It has secured contracts, activated credit cards and validated legal documents.
      It was not so many years ago when the careful

    • Explosion in IoT reveals risk of massive black market

      In a recent report Gartner predicts that by 2020 over 50% of new major business process and system will incorporate some element of the Internet of Things. From a security perspective this growth will ...

    • Identity data capture and validation is key

      This week I had the pleasure of visiting NORSIS event IDentitet 2016 in Oslo. Very well structured the event started with presentations around the capturing and validation of identity data which is fundamental for the trust in eIDs (and of course other types of credentials).

    • Server Name Indication and Hybrid Access Gateway

      ​SNI is an extension to TLS that has been around for a while, since 2003, but is becoming more and more important as installations become multi tenant with customers from completely different organizations.

    • The future of eID

      eID is an electronic identification solution for citizens and organizations, accessing services by banks, government authorities and other companies.

    • Sambi, not samba, makes the Swedish healthcare systems dance together

      ​For those of us who follows the Swedish healthcare sector, we recognize there is no lack of challenges. Stressful environments for the staff, legacy systems that needs to be updated and increasing demands from patients for eServices and seamless integration between caregivers.

    Related events