
Areas of expertise
Security
About
Austin, TX
HID powers the trusted identities of the world's people, places and things. Every day millions of people in more than 100 countries use our products and services to securely access physical and digital places. Over 2 billion things that need to be identified, verified and tracked are connected through HID's technology. We make it possible for people to transact safely, work productively and travel freely. We work with governments, universities, hospitals, financial institutions and some of the most innovative companies on the planet—helping them to create trusting and trusted physical and digital environments so that they and the people who use them can fulfill their potential.
...see more
Industry Gurus

Dr Eric Cole
CEO & Founder at Secure Anchor

Richard Stiennon
Chief Research Analyst at IT-Harvest

Chris Steffen
Vice President of Research at Enterprise Management Associates
Recommended content
What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?
Podcast
What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?
by Richard Stiennon
23 min
How Do Enterprises Build Proactive Cybersecurity Strategies?
Tech Article
How Do Enterprises Build Proactive Cybersecurity Strategies?
by Shubhangi Dua
7 min
Zero Trust in CI/CD Pipelines: Securing Your Software Supply Chain
Tech Article
Zero Trust in CI/CD Pipelines: Securing Your Software Supply Chain
by David Iyanu Jonathan
8 min
Read HID Global: Leading Through Challenges of Hospital Worker Violence

Security
HID Global: Leading Through Challenges of Hospital Worker Violence
1 min
Read HID Global: Physical Identity Challenges in the Healthcare Industry

Security
HID Global: Physical Identity Challenges in the Healthcare Industry
1 min
Read HID Global: Why Authentication is Still Such an Issue

Emerging Technologies
HID Global: Why Authentication is Still Such an Issue
1 min