This section provides public visibility into some of the research topics that we’re working on as well as their current status. If you would like to contribute, have ideas to share, or make sure that your company is in scope then please contact us (we never charge for inclusion). Take a look at our eStore for available publicly released research.
Recently Published & Upcoming
IAM TCO & ROI Modeling Tool (Completed)
Organizations often struggle to understand how the potential implementation of an advanced Identity Assurance and Credentialing program would impact their budgets, resources, operations and achievement against core objectives. From building requirements around compliance, threat models and controls to implementation, workflows and distribution this tool accurately captures and compares various deployment models (cloud, on premise, hybrid) and approaches (methodologies in certification, devices, and configuration) to quickly produce clarity on cost, skills, resource demand, timelines, dependencies, and multiple ways to look at TCO and ROI. Once the data is captured to reflect candidate solutions which can be done very quickly, much of the focus becomes modeling a variety of different potential situations to understand how specific circumstances impact time, cost, resources, return on investment.
Various visual charts are automated and can be used for business case support while meta data is available for supporting deep dive analysis. We built this tool ground up to take the blind spots out of the complex projects, enable accuracy of business cases, and condense the effort. It is not high level, and unlike other tools does not impose assumptions onto clients in order to make it “simple”. Rather, we have built a specific algorithm around a years of experience on these types of projects that automates data entry but correctly abstracts other key values specific to our client speeding up the process to their time can be spent on modeling and finding answers. All of the data, requirements, dependencies, existing and future resources are both customized and accelerated to represent a customized outcome in real time.
Human RFID Chip Implants; Subdermal Identification For Employees in the Enterprise (Published/Available). Visit eStore
This research report explores technology and human factors associated with implanting chips in humans that endeavor to blur the lines between inherent to limitations of human physiology by extending capabilities to more conveniently access to devices, applications and services.
Implanting chips in humans for such purposes has existed in various forms for a couple of decades within the confines of hobbyist and “biohacker” communities. However, vendors are developing productized solutions for mainstream consumer and corporate use and media have taken interest in exploring the concept, but only in context of its novelty – not real-world application and feasibility. D6 Research analyzes human chip implant technology in context of deployment within enterprise organizations for the purposes of employee identification credentials as applied to physical and logical access use cases.
Annual Current State and Outlook of Physical Security (Available via pre-sale now). Visit eStore
This research report takes inventory of how well the industry is keeping pace with its core objectives of protecting people, assets and operations while also looking ahead to understand how the industry is shifting significantly over the next decade. As opposed to previous decades where the industry demonstrated advancements and set the course for technology options for their channels, the next decade ahead will be defined by end users driven to deliver value to their respective organizations and keep pace with their IT related counterparts. The findings shared in this report are derived from research that includes analysis of physical security programs from some of the world’s leading global organizations. Learn about what is driving organizations to repudiate the current offerings and practices of the security industry and how their vision transforms their programs to be more effective, efficient, and improve overall outcomes.
Physical Security Identity, Credentials, Readers & Infrastructure (Available via pre-sale now). Visit eStore
A couple decades ago a mass migration from keyed locks to magnetic stripe then to RFID took place. The objective was not security but to reduce the cost of replacing locks when keys went missing. Due to the pervasive proprietary approach vendors have employed to maintain channel loyalty and lock end users into their supply chain, achieving compatibility in parallel to acquisitions, third party facilities, and migrations to new technology can be terribly complex for large organizations.
This research report is focused for end users and integrators to understand the variety of technology, trends, differences, and compatibility across the growing options from low to high frequency, smart card to and mobile, and other methods to facilitate improved management such as IP, key management and specific protocol standards. Technology scope includes physical credentials, mobile, readers, and controllers.
The work explores both common and complex barriers to migration, actionable intelligence to achieve forward-looking outcomes, and building requirements unique to an organization’s goals. Details such as data models, compatibility, interoperability, key management paradigms, design advantages and vulnerabilities are analyzed in detail. A full vendor and technology landscape assessment is included.
Mobile Credentials in Physical Access (Available via pre-sale now). Visit eStore
This research report is a module carved out of the full Physical Access Identity and Credential Infrastructure Report, offered separately to suit customers that desire a narrow focus.
Mobile has been pervasive everywhere – except physical security. But it’s coming. While most were cautious only a couple of years ago, nearly all vendors are jumping in to offer their own mobile solution. This research report investigates mobile credentials in physical security in terms of possibilities, actual current state capability segmentation, vendor approaches, what they get right and what they get wrong.
It also takes a deep look at how two paths are being formed; one of just virtualization physical cards to open doors and the other aiming to achieve something entirely different to do what legacy solutions could not. Exploring how new capabilities can be leveraged to transform end user security programs, and diving deep into how meaningful requirements can be formed and success measured.
Also, significant consideration and review are given to integrating with other systems, technologies, and counterparts; from IT to compliance as this technology necessitates revising not only physical security policy and procedures but conforming to many information security principles as it crosses the boundaries to devices, applications, and networks that physical security doesn’t own; and people that aren’t exclusive to their organization.
Sign up to receive notifications about exclusive content, research, events, and more.
Don’t worry, we go light on notifications and you can always opt out.