SlideShare a Scribd company logo
1 of 12
Download to read offline
Securing Experiences
via Digital Identity
A Frost & Sullivan Executive Briefing Paper
Sponsored by
1
The Rule of Three
Securing Cyber and
Physical Spaces
The proliferation of technology has transformed physi-
cal spaces as the Internet of Things (IoT) makes the
world increasingly connected. Technology convergence
is integrating the cyber and physical spaces, achieving
efficiency levels not previously possible. However, this
convergence presents new challenges. The physical
space is where people and ubiquitous objects reside
whereas the cyber space is virtual. Putting the two
together brings about cyber threats that can potentially
lead to physical harm.
The threat creates a greater need to secure public
places and critical infrastructure because they are
often the choice for physical attacks despite heightened
security measures. The conventional method in guard-
ing these places has been to restrict access and
monitoring of premises with solutions that require a
key, identification card or a password. However, physi-
cal solutions will not be the best measure in guarding
against unauthorised access in integrated cyber-physi-
cal attacks. The absence of air-gaps in operating
systems have made it possible for cyber attackers to
infiltrate internal controls with malware that cripple
operating systems without the need to physically enter
restricted premises. There is a need to strengthen the
resilience of control systems by safeguarding both
cyber and physical spaces effectively with authentica-
tion at both domains.
S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y02
2
3
Securing Customers
and Stakeholders’
Experience
As the IoT brings the cyber and physical worlds closer
together, people are increasingly going through their
daily routines in the cyber space such as performing
online banking transactions or shopping via eCom-
merce. Having a digital identity reduces the need for
people to be physically present in different places to
perform various activities. As these experiences are
evolving to become an essential part of our lives today,
digital identities have become the core of our virtual
experience.
However, such experiences have not been extended to
the physical domain because physical security contin-
ues to rely primarily on conventional systems to
regulate entry. People have to stop to identify
themselves be it using passwords, identity cards or
screening measures to validate who they are. To
empower people to perform their tasks more efficiently,
there is a growing demand for the need to get through
conventional security systems in a more seamless and
faster manner. This calls for technologies that could
track, identify, and recognise people and their activities
within certain boundaries. Tracking and identification
technologies are evolving from environments where
individuals are already known by the system such as
employees in a corporation, to environments such as
an airport where a large number of individuals are not
known by the system.
For instance, in the event of an emergency, the ability to
conduct physical authentication in the cyber domain
will enable security personnel to launch an investiga-
tion immediately without wasting time to be physically
present. It will be even more critical in situations that
require the validation of numerous stakeholders with
different access rights. The ability to efficiently authen-
ticate their identity, organisation, credentials and what
they can perform will be important. While having a
digital identity remains used largely for security
reasons, it is increasingly adopted for commercial
purposes in securing experiences with the personalisa-
tion of the service delivery.
Securing Digital
Identity
With the rise of cloud, social and mobility, a person no
longer has a single physical identity but multiple identi-
ties across applications, devices, and objects. It is not
uncommon for an individual to be carrying a number of
physical access passes such as tags, tokens and identi-
fication cards and having over 10 digital personas to
gain access to different online activities. While the
limitation and vulnerability of using passwords are
already well known, it remains the most frequently
used channel today.
As people link their physical self to their digital self, it
opens up new ways and a wider variety to serve the
same person in different settings. While the digital self
opens the possibility of hiding one’s true identity, no
two identities are ever the same. Authentication
technologies trace the unchanging physical attributes
of an individual. Digital identity derived from physical
identity provides an extra layer of protection through
biometric authentication. Not only does it reduce fraud,
it enhances the experience, which increases loyalty
over the customers’ life cycle. While digital identity
applies largely to people, it can also apply to ubiquitous
objects in an environment. As people and objects
become more connected, security and authentication
are taken to a new level.
S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y 03
International passenger volume has been on a steady
rise. The Airport Council International reported that
global passenger volume increased year-on-year by
6.2% in May 2017. It is anticipating passenger traffic to
double to 14.6 billion per annum by 2029 and to 23.6
billion by 2040. The data is consistent with the report
by the International Air Transport Authority (IATA) that
indicated an annual increase of 7.4% in international
passenger volume in terms of revenue passenger
kilometers. Growth in passenger traffic was the highest
in the Middle East followed by Asia-Pacific in 2016 at
11.3% and 10.9% respectively.
While this is good news for airport operators from a
revenue point of view, massive growth in passenger
traffic also brings greater security threats, resulting in
the need for additional layers of checking and screen-
ing. The threats are genuine. In 2016, terrorists
launched a physical attack on Brussels’ Zaventem
Airport killing 11 people and injuring hundreds more.
Attacks are not just happening at the physical level, as
airports are increasingly vulnerable to cyberattacks.
There are loopholes in a modern airport infrastructure
that provides cyber hackers with a backdoor to gain
access to a variety of operating systems.
The use of digital identity
will enable airports to
evolve from being efficient
operators to becoming
hubs of multiple activities
using innovative and new
business models
Scenario
AIRPORT
S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y04
14.6
BILLION
Passengers Passengers
2029 2040
23.6
BILLION6.2%
Y-o-Y
Growth
In mid-2017, a major ransom attack was launched on an
international airport in Ukraine. The airport was
paralysed by the attack as hackers encrypted files
coupled with malicious software that shut down their
computer system demanding a large sum of money to fix
the problem. A year before that, hackers launched cyber-
attacks on Vietnam’s two largest airports. The hackers
managed to hijack the flight information screen and
sound system inside the airports. All Internet systems
had to be shut down and documentation had to be done
manually. In June 2015, the carriers’ IT systems at
Poland’s Warsaw Chopin Airport were jammed by a
major distributed denial of service attack. The airport
took five hours to resolve the issue, resulting in 10
flights delayed with 1,400 passengers grounded.
Although no cyberattack has resulted in physical harm
up to this point, there is mounting fear among all stake-
holders that it will be a matter of time that one day, cyber
hackers can take over an aircraft steering wheel and
cause planes to crash from their mobile phones.
As airport operators get their heads around security,
there is a need to balance other aspects especially from
the commercial side of things. Globalisation and
economic affluence are bringing about more internation-
al travels. To tap into growth opportunities, govern-
ments emphasise the desire to see the continuation of
frictionless borders to support the transience of mobility
as an indication of a transport and transit hub.
To get more people to use their airports, operators have
expanded their roles beyond the traditional provision of
passenger gates to include multiple activities within an
airport environment such as dining, shopping, entertain-
ment and relaxation that bring passengers’ experiences
to a higher level so that they can be better in attracting
passengers and bring about more revenue.
Passengers’ experiences start from the moment that
they book their plane tickets and check-in online from
their own premises. And as they make their way to the
airside, they take on a different persona from one place
to another carrying out different activities. A passenger
can take on the persona of a commuter, a diner, or a
passenger in transit seeking entertainment and
relaxation before boarding the plane. While there can
be many things that passengers can enjoy within an
airport, their experiences throughout can be affected by
the amount of time needed and the hassle that they go
through to reach the airside.
Passengers spend a lot of time complying with security
screening, which is one of the things that give them a
great amount of stress although it is no doubt neces-
sary. The current approach in dealing with security risk
is to pile on more security checks. The battle against
identity fraud and terrorism has resulted in longer
queues, waiting time and delays in flight schedules.
As the volume of activities and traffic increase, the level
of risk faced by an airport operator increases as well.
From an airport operator’s point of view, a major
concern is security as well as the need to get passen-
gers to their airside on time. Safety and security remain
the priority and responsibility for all airport stakehold-
ers. Ironically, long queues waiting to go through
rigorous security checks make airports highly attrac-
tive as soft targets. At the same time, the increase in
automated self-service installations that allow
check-ins, baggage drops, and identity scans with
limited human intervention present cyber security risk
that threaten to disrupt operations from flowing
smoothly.
S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y 05
Despite extensive measures in place, airport operators
today are grappling with legacy and silo systems, a lack
of real-time security data, getting passengers to airside
areas on time, detecting suspects from leaving their
borders and safeguarding access control with different
access rights.
There is a need for airports to adopt a more effective
screening process while improving the traveling experi-
ence. Having a digital identity provides the ability to
quickly verify who the individual is. It supports passen-
gers’ experience from check-in, bag drop, dwell time and
their way to the airside. It facilitates the management of
airport participants and balances a rigorous safety
environment while pursuing higher levels of passenger
satisfaction.
Digital identities support passenger experience in many
ways. When combined with mobile, beacons and other
technologies, customer experience can be taken to a
higher level with personalised offering. Passengers can
be notified of nearby food and shopping outlets with
concessionaires based on their current location and past
transaction histories. More control can be given to
passengers by updating them about their flight time,
boarding gate and things they could do as they make
their way to the airside. However, there is also risk
involved as more personal data is at risk of being
exposed in the face of cyber threats.
Digital identities can also support airport management
and control with integrated security solutions that
enable automated processes and walk-through screen-
ing checks that bring about shorter waiting times and
better utilisation of staff. While there are many ways to
bring about digital identity, biometrics provides a proven
link between people’s digital credentials and their physi-
cal attributes. As airports increase their investment in
innovations, existing systems will be replaced with the
biometrics scanners that ensure accurate identity
match. Information captured by cutting-edge scanners
will enable security personnel to assess passenger risk
with speed and accuracy. As physical and cyber security
measures become more intertwined, the need for
real-time data, alerts, predictive analysis, and a central
command center will become critical to anticipate
threats and reduce the occurrence of human error.
S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y06
The priorities of critical infrastructure providers have
traditionally been slanted towards ensuring security
and uninterrupted operations. Taking such a cautious
approach is understandable for the sector. After all,
critical infrastructure is practically the most important
foundation of any economy. Society’s dependence on it
cannot be understated. A cut in power or water supply
will not only disrupt people’s daily routine, it can affect
people’s health and result in physical harm under
severe conditions. As a result, installing multiple layers
of security checks are deemed necessary to verify the
identity of employees.
Many of the conventional security solutions are such
that a more effective system will be at the expense of
experience. Employees today are given multiple
credentials to authenticate their identities, resulting in
a slower response time in carrying out their day-to-day
work. But does it always have to be a case where
security and experience cannot go hand-in-hand? And
why should CxOs accord priority and resources for a
better experience when they have more pressing
issues to deal with?
The use of digital identity will enable the critical
infrastructure sector to leapfrog from a
security-centric focus to one that optimises
experience for greater speed, accuracy, and
competitiveness
S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y 07
Scenario
CRITICAL INFRASTRUCTURE
Ideally, instead of relying on multiple credentials to
verify authorised personnel, the use of digital identity
will allow for a split-second verification that allows
employees to cover the premises in a shorter time span.
Operators of critical infrastructure will benefit from
shaving off precious seconds of unnecessary identity
processing.
Even so, this is possible only if the security personnel
are within the premises of the critical infrastructure. But
natural and man-made disasters can happen any time.
During off-operation hours where there is nobody in the
vicinity, employees have no visibility of the place unless
the security system can authenticate their identities
remotely using biometrics authenticated via the touch
screen and/or a facial scan from the camera of their
devices.
This is where digital identity will enable employees to
gain access into the security system to see who has
entered the building and their movements within the
place. Conventional security systems such as the use of
physical access tags will result in the need to make a trip
to the site to investigate and generate a report. Time is
wasted when ideally, emergency help should be called
for without delay.
Perhaps the concept of experience may be perceived to
be overrated in light of the threats that the sector is
facing. CxOs have more problems to grapple with than
before. Nevertheless, to stay ahead and remain competi-
tive, security should not be the only consideration factor
of CxOs. Instead, decision makers should explore wheth-
er or not they are neglecting other aspects that are
critical in driving productivity. Is their existing security
system compromising and complicating employees’
ability to safeguard their facilities?
Having said that, CxOs are well aware that critical
infrastructure in future will eventually be fully automat-
ed in operating devices and systems. Whether or not
significant gains can be further derived from employees’
daily productivity will be debatable until the time comes.
However, in the case of a crisis, the ability to authenti-
cate identity and regulate the seamless movement of
manpower within the vicinity will be critical.
When an unexpected event occurs, a non-operational
security staff is the among first to receive an alert
notification. In response to the alarm, he proceeds to
investigate the cause of it. With conventional security
systems, the employee has to stop at various check-
points to validate his identity using his physical pass to
enter restricted areas to see if any of the security
systems such as cameras and locks have been breached.
S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y08
Even as the emergency response unit is called upon for
assistance, gatekeepers face the challenge in verifying
the identities of these people as they arrive to address
the situation.
Ideally, the team should jump straight to action in a
critical emergency setting. But a security staff will not
grant entry to the premises of any critical infrastructure
site unless he is certain of their identities and creden-
tials. So time is lost in the verification process of identify-
ing the emergency respondents and other third party
contractors arriving at the scene, resulting in unneces-
sary delay and hassle. The process can be even more
time-consuming for disperse facilities located across
distant places.
There is a need for a security staff to respond to critical
situations in a more effective and efficient manner.
Conventional security systems using passwords, identify
tags and cards are no longer effective in a mission-criti-
cal situation that requires prompt responses from
multiple stakeholders. The use of digital identity empow-
ers a security staff to access the system of restricted
premises remotely upon getting an alert notification. So
an immediate investigation can be launched without
delay. Similarly, the use of digital identity for emergency
respondents comprising their credentials, expertise,
organisation and what they are authorised to do will
enable the security staff to grant clearance with greater
certainty and speed.
Hence, using digital identity will simplify worksite
management where personnel coming from various
sites can be mobilised and managed in a flexible and
secure manner, leading towards greater cost savings.
Nevertheless, justifying the replacement of legacy
infrastructure will inevitably face resistance in any
organisation. An attempt in quantifying the return on
investment using conventional financial metrics may not
provide the best decision-making tool in the case of
preventive measures because the idea is similar to
measuring the ROI of an insurance policy. They will
realise the value only when they need to make a claim.
Instead, decision-makers should assess the value of the
assets that they need to safeguard. They can quantify the
potential cost of damages to machines and control
systems, increase in insurance premium, loss in
revenue, loss in data and downtime. There will also be
an impact on intangibles such as their public image,
consumers’ loyalty, employees’ productivity and time
wasted. It is obvious that the critical infrastructure
sector cannot afford the risk and impact of such conse-
quences.
Decision-makers have to come to terms that preventive
and proactive measures need to be taken to safeguard
the assets that are critical to their business. Digital
identity provides the essential means to optimise their
resources that will sharpen their competitive edge.
S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y 09
Emerging technological tools are creating safer
outcomes for critical infrastructure and airports.
Increasing digitisation has been the key backbone for the
growth of biometrics. In addition, the proliferation of
biometrics is rapidly changing the public safety
landscape.
Biometrics enables authorities and security personnel to
address incidents in a near real-time manner for applica-
tions such as border control and facilities surveillance.
While fingerprint scanning is the most popular technolo-
gy, contactless technologies are rapidly gaining user
acceptance. The pinnacle of contactless biometrics is in
facial recognition, allowing solutions to be implemented
with minimal friction for places with a high throughput of
people.
While passwords and identification tags remain highly
used to protect restricted areas, there is one thing they
cannot offer which biometrics is able to provide. That is
a proven link between people’s digital credentials and
their physical attributes. Advancements in biometrics
technology such as deep learning for video analytics
have made these technologies highly accurate, allowing
authorities to pinpoint security threats to address some
of the biggest challenges in public safety.
Supplementing the use of biometrics with video analyt-
ics improve surveillance and enable dynamic responses
based on the output of the videos. Surveillance cameras
that leverage on emerging technologies such as artificial
intelligence are fast becoming integral in the video
analytics space to improve performance, real-time
threat detection, and efficiency of the system in border
control and safeguarding physical access in critical
infrastructure.
Video analytics is already being used for a wide range of
applications to improve safety, security, and operational
intelligence in perimeter breach, object classification,
motion tracking, and people counting. And finally,
cyber-security measures become paramount and have
to be incorporated with physical security measures. It
involves safeguarding systems, critical infrastructure
and sensitive data. While cyber security is not a
product-driven solution, it emphasises a holistic network
monitoring, incident reporting and response at the
department level. At the same time, cyber security
threats cannot be solved with a unilateral approach. All
stakeholders need to be involved to ensure the integrity,
confidentiality, and availability of data.
Leveraging on Technologies to Ensure the Rule of Three
S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y10
Technologies
Driving Digital ID
For people’s identity to be the core of their digital experi-
ence, a more seamless and convenient authentication
method is needed to transform security measures.
Biometrics has become the ideal gateway to establishing
a digital identity that bridges the gap between our physi-
cal and cyber identities. It can transform the experience
of customers, employees, and bring a higher level of
efficiency by enabling new applications and innovative
digital services in public safety.
Together with emerging technologies like video analytics
and cyber security solutions, an integrated suite of
solutions can bring about the necessary security to
combat sophisticated cyber threats in today’s complex
digital ecosystem. The future of public safety will set the
foundation of customer experience transformation using
digital identity that sets itself apart with convenience,
secure credentials, and customer-centric applications.
Decision-makers and key influencers have many consid-
erations in deploying a holistic security solution. It is
important to appoint an established technology partner
with a proven track record in public safety and the
foresight to anticipate threats that do not exist today.
NEC has invested substantially in technological innova-
tions to safeguard against integrated cyber-physical
attacks. It has been commissioned by a number of
authorities to deploy an integrated suite of solutions that
includes biometrics and advanced video analytics that
visualise human behaviour, detect wanted individuals,
safeguard restricted premises, and translate data into
insights in real-time to support informed decisions.
NEC has been a pioneer in multimodal biometrics
authentication with staggering advances over the years
in terms of its accuracy as its facial recognition solution
employs some of the most cutting-edge technologies in
the world.
Transforming Experience and
Operations with Digital Identity
S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y 11
Auckland
Bahrain
Bangkok
Beijing
Bengaluru
Bogota
Buenos Aires
Cape Town
Chennai
Colombo
Detroit
Dubai
Frankfurt
Iskandar, Johor Bahru
Istanbul
Jakarta
Kolkata
Kuala Lumpur
London
Manhattan
Mexico City
Miami
Milan
Mumbai
Moscow
New Delhi
Oxford
Paris
Pune
Rockville Centre
San Antonio
Sao Paulo
Seoul
Shanghai
Shenzhen
SiliconValley
Singapore
Sophia Antipolis
Sydney
Taipei
Tel Aviv
Tokyo
Toronto
Warsaw
Washington D.C.
We Accelerate Growth WWW.FROST.COM
ABOUT FROST & SULLIVAN
Frost & Sullivan is a growth partnership company focused on helping our clients achieve transformational growth as they are
impacted by an economic environment dominated by accelerating change, driven by disruptive technologies, mega trends, and new
business models.The research practice conducts monitoring and analyzing technical, economic, mega trends, competitive, customer,
best practices and emerging markets research into one system which supports the entire “growth cycle”, which enables clients to
have a complete picture of their industry, as well as how all other industries are impacted by these factors.
Contact us: Start the discussion
To join our Growth Partnership, please visit www.frost.com
Copyright Notice
The contents of these pages are copyright © Frost & Sullivan. All rights reserved. Except with the prior written permission of Frost & Sullivan,
you may not (whether directly or indirectly) create a database in an electronic or other form by downloading and storing all or any part of
the content of this document. No part of this document may be copied or otherwise incorporated into, transmitted to, or stored in any other
website, electronic retrieval system, publication or other work in any form (whether hard copy, electronic or otherwise) without the prior written
permission of Frost & Sullivan.
ABOUT NEC
.
.
NEC Corporation is a leader in the integration of IT and network technologies with a presence in 160 countries and $25 billion
in revenues. NEC delivers integrated Solutions for Society that are aligned with our customers' priorities to create new value
for people, businesses and society, with a special focus on safety, security and efficiency.
For more information, visit NEC at www.nec.com

More Related Content

What's hot

Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
Content Rules, Inc.
 
Cyber law
Cyber lawCyber law
Cyber law
abiabel
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
Amit Kumar
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
monchai sopitka
 

What's hot (18)

IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security Providers
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Cyber law
Cyber lawCyber law
Cyber law
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishing
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
 
Information security
Information securityInformation security
Information security
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 

Similar to NEC Public Safety | Digital Identity for a Secured World

Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
danas19
 
e-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st articlee-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st article
Aizharkyn Burkanova
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
tonkung6
 

Similar to NEC Public Safety | Digital Identity for a Secured World (20)

Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)
 
IDenTrip - Seamless Airtravel with Biometric Identity
IDenTrip - Seamless Airtravel with Biometric IdentityIDenTrip - Seamless Airtravel with Biometric Identity
IDenTrip - Seamless Airtravel with Biometric Identity
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
 
Modern technology used in airport security
Modern technology used in airport security Modern technology used in airport security
Modern technology used in airport security
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
e-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st articlee-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st article
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
Risk analytics to fight fraud - cio applications europe
Risk analytics to fight fraud  - cio applications europeRisk analytics to fight fraud  - cio applications europe
Risk analytics to fight fraud - cio applications europe
 
eGovernance mechanism with BioMetrics Classification and Authentication for D...
eGovernance mechanism with BioMetrics Classification and Authentication for D...eGovernance mechanism with BioMetrics Classification and Authentication for D...
eGovernance mechanism with BioMetrics Classification and Authentication for D...
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
Electronic Passport Verification System using IOT
Electronic Passport Verification System using IOTElectronic Passport Verification System using IOT
Electronic Passport Verification System using IOT
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
 
Biometric Fusion Helps in Border Control.pdf
Biometric Fusion Helps in Border Control.pdfBiometric Fusion Helps in Border Control.pdf
Biometric Fusion Helps in Border Control.pdf
 

More from NEC Public Safety

More from NEC Public Safety (14)

NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller
 
NEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter LeeNEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter Lee
 
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
 
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
NEC Public Safety | The Global Risk to Policing from the Fusion of the Real W...
 
NEC Public Safety | New Technologies to Investigate Human Trafficking and Mig...
NEC Public Safety | New Technologies to Investigate Human Trafficking and Mig...NEC Public Safety | New Technologies to Investigate Human Trafficking and Mig...
NEC Public Safety | New Technologies to Investigate Human Trafficking and Mig...
 
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges
NEC Public Safety | Innovation Can Be Channeled to Solve Future Challenges
 
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
 
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
 
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter LeeNEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming Industry
 
NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017
 
NEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner Handbook
 

Recently uploaded

Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 

Recently uploaded (20)

Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
 
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
 
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptx
 
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORSPPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
 

NEC Public Safety | Digital Identity for a Secured World

  • 1. Securing Experiences via Digital Identity A Frost & Sullivan Executive Briefing Paper Sponsored by
  • 2. 1 The Rule of Three Securing Cyber and Physical Spaces The proliferation of technology has transformed physi- cal spaces as the Internet of Things (IoT) makes the world increasingly connected. Technology convergence is integrating the cyber and physical spaces, achieving efficiency levels not previously possible. However, this convergence presents new challenges. The physical space is where people and ubiquitous objects reside whereas the cyber space is virtual. Putting the two together brings about cyber threats that can potentially lead to physical harm. The threat creates a greater need to secure public places and critical infrastructure because they are often the choice for physical attacks despite heightened security measures. The conventional method in guard- ing these places has been to restrict access and monitoring of premises with solutions that require a key, identification card or a password. However, physi- cal solutions will not be the best measure in guarding against unauthorised access in integrated cyber-physi- cal attacks. The absence of air-gaps in operating systems have made it possible for cyber attackers to infiltrate internal controls with malware that cripple operating systems without the need to physically enter restricted premises. There is a need to strengthen the resilience of control systems by safeguarding both cyber and physical spaces effectively with authentica- tion at both domains. S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y02
  • 3. 2 3 Securing Customers and Stakeholders’ Experience As the IoT brings the cyber and physical worlds closer together, people are increasingly going through their daily routines in the cyber space such as performing online banking transactions or shopping via eCom- merce. Having a digital identity reduces the need for people to be physically present in different places to perform various activities. As these experiences are evolving to become an essential part of our lives today, digital identities have become the core of our virtual experience. However, such experiences have not been extended to the physical domain because physical security contin- ues to rely primarily on conventional systems to regulate entry. People have to stop to identify themselves be it using passwords, identity cards or screening measures to validate who they are. To empower people to perform their tasks more efficiently, there is a growing demand for the need to get through conventional security systems in a more seamless and faster manner. This calls for technologies that could track, identify, and recognise people and their activities within certain boundaries. Tracking and identification technologies are evolving from environments where individuals are already known by the system such as employees in a corporation, to environments such as an airport where a large number of individuals are not known by the system. For instance, in the event of an emergency, the ability to conduct physical authentication in the cyber domain will enable security personnel to launch an investiga- tion immediately without wasting time to be physically present. It will be even more critical in situations that require the validation of numerous stakeholders with different access rights. The ability to efficiently authen- ticate their identity, organisation, credentials and what they can perform will be important. While having a digital identity remains used largely for security reasons, it is increasingly adopted for commercial purposes in securing experiences with the personalisa- tion of the service delivery. Securing Digital Identity With the rise of cloud, social and mobility, a person no longer has a single physical identity but multiple identi- ties across applications, devices, and objects. It is not uncommon for an individual to be carrying a number of physical access passes such as tags, tokens and identi- fication cards and having over 10 digital personas to gain access to different online activities. While the limitation and vulnerability of using passwords are already well known, it remains the most frequently used channel today. As people link their physical self to their digital self, it opens up new ways and a wider variety to serve the same person in different settings. While the digital self opens the possibility of hiding one’s true identity, no two identities are ever the same. Authentication technologies trace the unchanging physical attributes of an individual. Digital identity derived from physical identity provides an extra layer of protection through biometric authentication. Not only does it reduce fraud, it enhances the experience, which increases loyalty over the customers’ life cycle. While digital identity applies largely to people, it can also apply to ubiquitous objects in an environment. As people and objects become more connected, security and authentication are taken to a new level. S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y 03
  • 4. International passenger volume has been on a steady rise. The Airport Council International reported that global passenger volume increased year-on-year by 6.2% in May 2017. It is anticipating passenger traffic to double to 14.6 billion per annum by 2029 and to 23.6 billion by 2040. The data is consistent with the report by the International Air Transport Authority (IATA) that indicated an annual increase of 7.4% in international passenger volume in terms of revenue passenger kilometers. Growth in passenger traffic was the highest in the Middle East followed by Asia-Pacific in 2016 at 11.3% and 10.9% respectively. While this is good news for airport operators from a revenue point of view, massive growth in passenger traffic also brings greater security threats, resulting in the need for additional layers of checking and screen- ing. The threats are genuine. In 2016, terrorists launched a physical attack on Brussels’ Zaventem Airport killing 11 people and injuring hundreds more. Attacks are not just happening at the physical level, as airports are increasingly vulnerable to cyberattacks. There are loopholes in a modern airport infrastructure that provides cyber hackers with a backdoor to gain access to a variety of operating systems. The use of digital identity will enable airports to evolve from being efficient operators to becoming hubs of multiple activities using innovative and new business models Scenario AIRPORT S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y04 14.6 BILLION Passengers Passengers 2029 2040 23.6 BILLION6.2% Y-o-Y Growth
  • 5. In mid-2017, a major ransom attack was launched on an international airport in Ukraine. The airport was paralysed by the attack as hackers encrypted files coupled with malicious software that shut down their computer system demanding a large sum of money to fix the problem. A year before that, hackers launched cyber- attacks on Vietnam’s two largest airports. The hackers managed to hijack the flight information screen and sound system inside the airports. All Internet systems had to be shut down and documentation had to be done manually. In June 2015, the carriers’ IT systems at Poland’s Warsaw Chopin Airport were jammed by a major distributed denial of service attack. The airport took five hours to resolve the issue, resulting in 10 flights delayed with 1,400 passengers grounded. Although no cyberattack has resulted in physical harm up to this point, there is mounting fear among all stake- holders that it will be a matter of time that one day, cyber hackers can take over an aircraft steering wheel and cause planes to crash from their mobile phones. As airport operators get their heads around security, there is a need to balance other aspects especially from the commercial side of things. Globalisation and economic affluence are bringing about more internation- al travels. To tap into growth opportunities, govern- ments emphasise the desire to see the continuation of frictionless borders to support the transience of mobility as an indication of a transport and transit hub. To get more people to use their airports, operators have expanded their roles beyond the traditional provision of passenger gates to include multiple activities within an airport environment such as dining, shopping, entertain- ment and relaxation that bring passengers’ experiences to a higher level so that they can be better in attracting passengers and bring about more revenue. Passengers’ experiences start from the moment that they book their plane tickets and check-in online from their own premises. And as they make their way to the airside, they take on a different persona from one place to another carrying out different activities. A passenger can take on the persona of a commuter, a diner, or a passenger in transit seeking entertainment and relaxation before boarding the plane. While there can be many things that passengers can enjoy within an airport, their experiences throughout can be affected by the amount of time needed and the hassle that they go through to reach the airside. Passengers spend a lot of time complying with security screening, which is one of the things that give them a great amount of stress although it is no doubt neces- sary. The current approach in dealing with security risk is to pile on more security checks. The battle against identity fraud and terrorism has resulted in longer queues, waiting time and delays in flight schedules. As the volume of activities and traffic increase, the level of risk faced by an airport operator increases as well. From an airport operator’s point of view, a major concern is security as well as the need to get passen- gers to their airside on time. Safety and security remain the priority and responsibility for all airport stakehold- ers. Ironically, long queues waiting to go through rigorous security checks make airports highly attrac- tive as soft targets. At the same time, the increase in automated self-service installations that allow check-ins, baggage drops, and identity scans with limited human intervention present cyber security risk that threaten to disrupt operations from flowing smoothly. S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y 05
  • 6. Despite extensive measures in place, airport operators today are grappling with legacy and silo systems, a lack of real-time security data, getting passengers to airside areas on time, detecting suspects from leaving their borders and safeguarding access control with different access rights. There is a need for airports to adopt a more effective screening process while improving the traveling experi- ence. Having a digital identity provides the ability to quickly verify who the individual is. It supports passen- gers’ experience from check-in, bag drop, dwell time and their way to the airside. It facilitates the management of airport participants and balances a rigorous safety environment while pursuing higher levels of passenger satisfaction. Digital identities support passenger experience in many ways. When combined with mobile, beacons and other technologies, customer experience can be taken to a higher level with personalised offering. Passengers can be notified of nearby food and shopping outlets with concessionaires based on their current location and past transaction histories. More control can be given to passengers by updating them about their flight time, boarding gate and things they could do as they make their way to the airside. However, there is also risk involved as more personal data is at risk of being exposed in the face of cyber threats. Digital identities can also support airport management and control with integrated security solutions that enable automated processes and walk-through screen- ing checks that bring about shorter waiting times and better utilisation of staff. While there are many ways to bring about digital identity, biometrics provides a proven link between people’s digital credentials and their physi- cal attributes. As airports increase their investment in innovations, existing systems will be replaced with the biometrics scanners that ensure accurate identity match. Information captured by cutting-edge scanners will enable security personnel to assess passenger risk with speed and accuracy. As physical and cyber security measures become more intertwined, the need for real-time data, alerts, predictive analysis, and a central command center will become critical to anticipate threats and reduce the occurrence of human error. S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y06
  • 7. The priorities of critical infrastructure providers have traditionally been slanted towards ensuring security and uninterrupted operations. Taking such a cautious approach is understandable for the sector. After all, critical infrastructure is practically the most important foundation of any economy. Society’s dependence on it cannot be understated. A cut in power or water supply will not only disrupt people’s daily routine, it can affect people’s health and result in physical harm under severe conditions. As a result, installing multiple layers of security checks are deemed necessary to verify the identity of employees. Many of the conventional security solutions are such that a more effective system will be at the expense of experience. Employees today are given multiple credentials to authenticate their identities, resulting in a slower response time in carrying out their day-to-day work. But does it always have to be a case where security and experience cannot go hand-in-hand? And why should CxOs accord priority and resources for a better experience when they have more pressing issues to deal with? The use of digital identity will enable the critical infrastructure sector to leapfrog from a security-centric focus to one that optimises experience for greater speed, accuracy, and competitiveness S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y 07 Scenario CRITICAL INFRASTRUCTURE
  • 8. Ideally, instead of relying on multiple credentials to verify authorised personnel, the use of digital identity will allow for a split-second verification that allows employees to cover the premises in a shorter time span. Operators of critical infrastructure will benefit from shaving off precious seconds of unnecessary identity processing. Even so, this is possible only if the security personnel are within the premises of the critical infrastructure. But natural and man-made disasters can happen any time. During off-operation hours where there is nobody in the vicinity, employees have no visibility of the place unless the security system can authenticate their identities remotely using biometrics authenticated via the touch screen and/or a facial scan from the camera of their devices. This is where digital identity will enable employees to gain access into the security system to see who has entered the building and their movements within the place. Conventional security systems such as the use of physical access tags will result in the need to make a trip to the site to investigate and generate a report. Time is wasted when ideally, emergency help should be called for without delay. Perhaps the concept of experience may be perceived to be overrated in light of the threats that the sector is facing. CxOs have more problems to grapple with than before. Nevertheless, to stay ahead and remain competi- tive, security should not be the only consideration factor of CxOs. Instead, decision makers should explore wheth- er or not they are neglecting other aspects that are critical in driving productivity. Is their existing security system compromising and complicating employees’ ability to safeguard their facilities? Having said that, CxOs are well aware that critical infrastructure in future will eventually be fully automat- ed in operating devices and systems. Whether or not significant gains can be further derived from employees’ daily productivity will be debatable until the time comes. However, in the case of a crisis, the ability to authenti- cate identity and regulate the seamless movement of manpower within the vicinity will be critical. When an unexpected event occurs, a non-operational security staff is the among first to receive an alert notification. In response to the alarm, he proceeds to investigate the cause of it. With conventional security systems, the employee has to stop at various check- points to validate his identity using his physical pass to enter restricted areas to see if any of the security systems such as cameras and locks have been breached. S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y08
  • 9. Even as the emergency response unit is called upon for assistance, gatekeepers face the challenge in verifying the identities of these people as they arrive to address the situation. Ideally, the team should jump straight to action in a critical emergency setting. But a security staff will not grant entry to the premises of any critical infrastructure site unless he is certain of their identities and creden- tials. So time is lost in the verification process of identify- ing the emergency respondents and other third party contractors arriving at the scene, resulting in unneces- sary delay and hassle. The process can be even more time-consuming for disperse facilities located across distant places. There is a need for a security staff to respond to critical situations in a more effective and efficient manner. Conventional security systems using passwords, identify tags and cards are no longer effective in a mission-criti- cal situation that requires prompt responses from multiple stakeholders. The use of digital identity empow- ers a security staff to access the system of restricted premises remotely upon getting an alert notification. So an immediate investigation can be launched without delay. Similarly, the use of digital identity for emergency respondents comprising their credentials, expertise, organisation and what they are authorised to do will enable the security staff to grant clearance with greater certainty and speed. Hence, using digital identity will simplify worksite management where personnel coming from various sites can be mobilised and managed in a flexible and secure manner, leading towards greater cost savings. Nevertheless, justifying the replacement of legacy infrastructure will inevitably face resistance in any organisation. An attempt in quantifying the return on investment using conventional financial metrics may not provide the best decision-making tool in the case of preventive measures because the idea is similar to measuring the ROI of an insurance policy. They will realise the value only when they need to make a claim. Instead, decision-makers should assess the value of the assets that they need to safeguard. They can quantify the potential cost of damages to machines and control systems, increase in insurance premium, loss in revenue, loss in data and downtime. There will also be an impact on intangibles such as their public image, consumers’ loyalty, employees’ productivity and time wasted. It is obvious that the critical infrastructure sector cannot afford the risk and impact of such conse- quences. Decision-makers have to come to terms that preventive and proactive measures need to be taken to safeguard the assets that are critical to their business. Digital identity provides the essential means to optimise their resources that will sharpen their competitive edge. S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y 09
  • 10. Emerging technological tools are creating safer outcomes for critical infrastructure and airports. Increasing digitisation has been the key backbone for the growth of biometrics. In addition, the proliferation of biometrics is rapidly changing the public safety landscape. Biometrics enables authorities and security personnel to address incidents in a near real-time manner for applica- tions such as border control and facilities surveillance. While fingerprint scanning is the most popular technolo- gy, contactless technologies are rapidly gaining user acceptance. The pinnacle of contactless biometrics is in facial recognition, allowing solutions to be implemented with minimal friction for places with a high throughput of people. While passwords and identification tags remain highly used to protect restricted areas, there is one thing they cannot offer which biometrics is able to provide. That is a proven link between people’s digital credentials and their physical attributes. Advancements in biometrics technology such as deep learning for video analytics have made these technologies highly accurate, allowing authorities to pinpoint security threats to address some of the biggest challenges in public safety. Supplementing the use of biometrics with video analyt- ics improve surveillance and enable dynamic responses based on the output of the videos. Surveillance cameras that leverage on emerging technologies such as artificial intelligence are fast becoming integral in the video analytics space to improve performance, real-time threat detection, and efficiency of the system in border control and safeguarding physical access in critical infrastructure. Video analytics is already being used for a wide range of applications to improve safety, security, and operational intelligence in perimeter breach, object classification, motion tracking, and people counting. And finally, cyber-security measures become paramount and have to be incorporated with physical security measures. It involves safeguarding systems, critical infrastructure and sensitive data. While cyber security is not a product-driven solution, it emphasises a holistic network monitoring, incident reporting and response at the department level. At the same time, cyber security threats cannot be solved with a unilateral approach. All stakeholders need to be involved to ensure the integrity, confidentiality, and availability of data. Leveraging on Technologies to Ensure the Rule of Three S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y10 Technologies Driving Digital ID
  • 11. For people’s identity to be the core of their digital experi- ence, a more seamless and convenient authentication method is needed to transform security measures. Biometrics has become the ideal gateway to establishing a digital identity that bridges the gap between our physi- cal and cyber identities. It can transform the experience of customers, employees, and bring a higher level of efficiency by enabling new applications and innovative digital services in public safety. Together with emerging technologies like video analytics and cyber security solutions, an integrated suite of solutions can bring about the necessary security to combat sophisticated cyber threats in today’s complex digital ecosystem. The future of public safety will set the foundation of customer experience transformation using digital identity that sets itself apart with convenience, secure credentials, and customer-centric applications. Decision-makers and key influencers have many consid- erations in deploying a holistic security solution. It is important to appoint an established technology partner with a proven track record in public safety and the foresight to anticipate threats that do not exist today. NEC has invested substantially in technological innova- tions to safeguard against integrated cyber-physical attacks. It has been commissioned by a number of authorities to deploy an integrated suite of solutions that includes biometrics and advanced video analytics that visualise human behaviour, detect wanted individuals, safeguard restricted premises, and translate data into insights in real-time to support informed decisions. NEC has been a pioneer in multimodal biometrics authentication with staggering advances over the years in terms of its accuracy as its facial recognition solution employs some of the most cutting-edge technologies in the world. Transforming Experience and Operations with Digital Identity S E C U R I N G E X P E R I E N C E S V I A D I G I T A L I D E N T I T Y 11
  • 12. Auckland Bahrain Bangkok Beijing Bengaluru Bogota Buenos Aires Cape Town Chennai Colombo Detroit Dubai Frankfurt Iskandar, Johor Bahru Istanbul Jakarta Kolkata Kuala Lumpur London Manhattan Mexico City Miami Milan Mumbai Moscow New Delhi Oxford Paris Pune Rockville Centre San Antonio Sao Paulo Seoul Shanghai Shenzhen SiliconValley Singapore Sophia Antipolis Sydney Taipei Tel Aviv Tokyo Toronto Warsaw Washington D.C. We Accelerate Growth WWW.FROST.COM ABOUT FROST & SULLIVAN Frost & Sullivan is a growth partnership company focused on helping our clients achieve transformational growth as they are impacted by an economic environment dominated by accelerating change, driven by disruptive technologies, mega trends, and new business models.The research practice conducts monitoring and analyzing technical, economic, mega trends, competitive, customer, best practices and emerging markets research into one system which supports the entire “growth cycle”, which enables clients to have a complete picture of their industry, as well as how all other industries are impacted by these factors. Contact us: Start the discussion To join our Growth Partnership, please visit www.frost.com Copyright Notice The contents of these pages are copyright © Frost & Sullivan. All rights reserved. Except with the prior written permission of Frost & Sullivan, you may not (whether directly or indirectly) create a database in an electronic or other form by downloading and storing all or any part of the content of this document. No part of this document may be copied or otherwise incorporated into, transmitted to, or stored in any other website, electronic retrieval system, publication or other work in any form (whether hard copy, electronic or otherwise) without the prior written permission of Frost & Sullivan. ABOUT NEC . . NEC Corporation is a leader in the integration of IT and network technologies with a presence in 160 countries and $25 billion in revenues. NEC delivers integrated Solutions for Society that are aligned with our customers' priorities to create new value for people, businesses and society, with a special focus on safety, security and efficiency. For more information, visit NEC at www.nec.com