Published On: Mon, Jan 13th, 2014

Home Security Vital drifts for identity and access management – 2014

Identity and Access Management

NEW YORK, USA: CA Technologies has pronounced its predictions as regards to identity and access management (IAM) and their impact on security professionals in 2014.

“We believe that the technology trends of cloud, mobile and social will continue to heavily influence the direction and need for IAM in 2014, but we also see new business demands and enabling technologies joining in to put a twist on the IAM and security path for many organizations,” reportedly said Mike Denning, senior vice president and general manager, Security business, CA Technologies.

Logo CA Technologies

Identity and Access Management in 2014- a prediction of what lies in the vistas traversed ahead:

1) The software-defined, open enterprise emerges: The enterprise is remaking itself into a platform that developers can experiment with and innovate upon. Every IT layer ranging from data to application to infrastructure to network is becoming service-enabled and software-defined through APIs. The pattern extends beyond the data center to partners and cloud services as enterprises are forced to open up.

A new groundswell of innovation will be ushered in as developers both inside and outside the enterprise gain access to the core building blocks that define an organization. This will speed experimentation and innovation as they construct new mashups leveraging the full range of software defined assets. Traditional IT departments will need to evolve to protect and secure access to these new assets as building blocks for agile development.

2) Hardware elements in mobile devices will become an increasingly important part of IAM: Users will continue to adopt new mobile devices on a short (12-24 months) cycle, rapidly making advanced hardware security technologies, such as ARM TrustZone that is widely available. Device manufacturers will build security systems, such as Samsung Knox, on top of these technologies.

These systems will help solve the BYOD challenges enterprises face by providing secure ways to separate corporate and personal data and applications. In addition to securing the devices themselves, users will be able to use them to identify themselves to other systems and to perform advanced functions like secure payments. The phone will finally begin to establish itself as the primary and secure way of authenticating users and proving identity.

3) Lack of scalable identity proofing will continue to vex broader B2C/G2C deployments: The recent online user experiences as share of the Obamacare rollout demonstrated the logistical challenges of validating online identities in an accurate and scalable manner. As more and more users enroll in online services, demand for identity proofing services will escalate significantly, but organizations will continue to experience identity proofing challenges.

Whereas the sources for identity proofing data will continue to multiply with the digitization and exposure of new public and private records, this continued demand for identity proofing in 2014 will force the industry to pool resources and partner more closely to deliver scalable identity proofing to meet these needs.

4) The CMO will become a new force for broad identity management initiatives: Successful marketing depends on understanding customers’ needs and providing them with a convenient experience for registration and enrollment. Allowing social login and maintaining a corporate presence on social networks affords an opportunity to capture valuable customer data, comprising user identities, followed by social interaction patterns, and browsing and buying tendencies.

The CMO will press for these capabilities to aid the enterprise engage with its customers, develop a stronger relationship with them, and improve loyalty. Identity management infrastructures that support these marketing initiatives will experience improved demand as “business enablement” gains wider accreditation as a critical driver of IAM.

5) Risk-based authentication expands beyond Financial Services: While corporate desire for employee and customer mobile enablement is strong, security mechanisms that are cumbersome for consumers accustomed to instant access are met with resistance or all-out avoidance. The need for both stronger authentication and a positive user experience will lead to the widespread adoption of risk-based authentication, in which contextual data about users, devices, applications, locations and other potential risk factors are collected and analyzed to determine a risk-level for the user’s identity.

Financial Services has been a leader in the adoption of risk-based authentication due to the high value of many customer transactions. But, this technology will begin to be more widely adopted across other industries as the need for improved security without impacting user convenience increases.


About the Author

- A Journalist by interest and a Music Enthusiast by passion. Wedded to Mother Nature, Jawed indulges his aesthetics in travelling and reading books of varied genres. Having covered News stories for top Dailies in his formative years, that is, he is game for tryst with Technology at Techmagnifier.

Home Security Vital drifts for identity and access management – 2014