
Across Asia, digital transformation is reshaping how people interact with systems, services and spaces.
As smart city initiatives expand and workplaces continue to digitise, identity is increasingly becoming the infrastructure that governs access across services, systems and physical environment.
In Malaysia, the shift is a reality, as the nation moves toward a Digital Identification system where a single login enables access to services.
The target for 2026 is 17 million registered MyDigital ID users, up from 7.3 million registered users last year.
As ecosystems expand, identity and access management is no longer simply an IT function. It increasingly governs how people authenticate, move, and transact across both physical and digital environments.
Yet many organisations have found themselves deferring foundational security decisions due to budget constraints and competing priorities.
As physical and digital systems converge, access frameworks developed independently are proving difficult to align at scale, creating inefficiencies and introducing new risks.
When access underpins operations, can organisations afford to keep delaying?
Access today spans facilities, IT infrastructure, cloud platforms and mobile devices, often in real time.
Physical-digital identity convergence represents a significant shift.
As evidenced from the HID 2026 State of Security and Identity Report, 84 per cent of organisations across Asia Pacific (APAC) have deployed (32 per cent) or are evaluating (52 per cent) converged solutions.
This trend is also evident in Malaysia's evolving digital landscape, where initiatives such as MyDigital ID, are progressively embedded into government services, such as high-frequency government touchpoints like MyJPJ — where MyDigital ID is expected to be the sole login method.
As identity becomes the gateway to multiple public services, access is no longer a one-off credential check that can be governed in isolation.
At the same time, access decisions are evolving beyond static permit-or-deny lists toward real-time, context-aware evaluation. Legacy architectures were not built for continuous, risk-informed assessment at scale.
The gap between modern operating realities and legacy access infrastructure is becoming harder to ignore. When such investment is deferred, the gap does not remain contained — it widens.
In Malaysia, where digital identity is playing a growing role across both public and private services, the ability to manage access consistently across systems is becoming more critical.
When upgrades are deferred, gaps begin to surface in day-to-day operations and oversight, resulting in inefficiencies, fragmented governance and a gradual erosion of digital trust among employees, customers and partners.
As convergence accelerates, unresolved fragmentation compounds regulatory exposure, limits visibility and makes responding to emerging threats more difficult. While deferral may ease short-term budget pressure, it significantly increases long-term operational and reputational costs.
Today's digital services are built around identity rather than layered on top of it. When identity fails, the impact is no longer confined to a single system — it can disrupt multiple environments at once.
Designing for resilience therefore requires identity-first security frameworks that support long-term operational stability.
This includes adopting modern authentication methods such as mobile credentials secured by device biometrics, biometric verification that links access to a verified individual rather than a transferable credential, and AI-enhanced systems capable of detecting anomalies or suspicious behaviours in real time.
Resilience also depends on integration. When physical access control connects with corporate networks and cloud applications, organisations can apply consistent policies and maintain clear oversight of who is accessing what.
Rather than managing separate systems for buildings, networks and applications, companies are increasingly anchoring access decisions around verified identity. This approach strengthens security while maintaining a seamless user experience and supporting stronger governance.
Mobile credentials and biometrics are accelerating this transition. In APAC, 49 per cent of organisations have already deployed mobile credentials, while biometric access technologies are now in widespread use or planned by the majority. By linking access directly to individuals, these technologies improve security without adding user friction.
Together, these developments point to a broader move toward unified, identity-led access frameworks that balance usability, privacy and regulatory requirements across physical and digital environments.
Digital transformation often resembles a puzzle in motion. New technologies, new work models, and new digital services are constantly being added to the ecosystem.
Without a unifying access strategy, organisations risk assembling systems that function individually but fail to operate cohesively.
In Asia's increasingly connected future, organisations that move from fragmented access solutions toward integrated, identity-centric platforms will be better positioned to scale securely and sustain trust.
---
Autor(en)/Author(s): Prabhuraj Patil
Dieser Artikel ist neu veröffentlicht von / This article is republished from: New Straits Times, 19.04.2026

