HID Report September 2024 | Page 11

HID al because it hared secrets such s , which are often phishing attacks ”

ALLIANCES
HID supports both synced and devicebound passkeys . HID ’ s device-bound passkeys in the form of smart cards combine physical and logical access technologies into one corporate ID badge , giving employees access to business applications and doors through a single smart card that they are already used to . These converged credentials are also multi-technology , supporting a diverse range of physical and logical access technologies ( FIDO2 , PKI , OATH ), and giving enterprises even more flexibility .
The enterprise path to becoming passwordless However , the transition from traditional password-based authentication to passkeys is not without its challenges , particularly for organisations with established infrastructures . “ Many enterprises , especially those with a long history , have accumulated a complex array of services and tools over time ,” says Sean . “ Some of these systems may be outdated or require significant updates to accommodate modern authentication methods .”
Recognising this , companies like HID have partnered with tech giants such as Microsoft to develop solutions that bridge the gap between legacy systems and passwordless authentication .
These hybrid solutions are designed to work alongside existing infrastructure , enabling a gradual transition that doesn ’ t require a complete overhaul of an organisation ’ s IT systems . This approach is particularly valuable for enterprises that aren ’ t yet ready or able to implement a full-scale shift to passwordless authentication . By offering compatibility with older systems , these solutions provide a pathway for organisations to enhance their security posture without disrupting their operations or incurring prohibitive costs .
The importance of choice and flexibility in authentication methods cannot be overstated . As Sean emphasises : “ For organisations , choice and flexibility are essential as the first critical component of an authentication strategy . In most enterprise environments , a one-size-fitsall approach simply doesn ’ t work .” This recognition of the diverse needs within a single organisation underpins the development of flexible authentication solutions .
By offering a range of options , from security keys to smart cards and beyond , vendors like HID ensure that enterprises can tailor their authentication strategies to meet the specific needs of different user groups and use cases . This flexibility is crucial in addressing the varied
hidglobal . com 11