Академический Документы
Профессиональный Документы
Культура Документы
presents
Identity
Management
Identity management—or identity and ber of devices taking their place in the
access management (IAM)—addresses “Internet of Things” (IoT) will have a
the need to ensure appropriate access corresponding effect on how compa-
to resources across increasingly het- nies employ their identity management
erogeneous technology environments structures. This eGuide introduces the
while satisfying compliance needs. But concept of the “Internet of Identities”
IAM must change right along with its and explores how it will affect IAM in
environment, and the increasing num- the very near future.
2 4 6 8
eGuide IDG Enterprise is COMPUTERWORLD
2 of 8
eGuide IDG Enterprise is COMPUTERWORLD
Download
Vines and Novell, way back in the day. Think of AD, and multiply • Security takes a bigger IAM role. According to ESG re- eBook
it by some exponential factor. As the Internet of Identities takes search, 66 percent of organizations claim that their security
shape, Mark and I expect some pretty big changes. For example: group is significantly or somewhat more involved with IAM
What’s Trending
policies, procedures, and technologies today than it was in Authentication
• Organizations will centralize IAM management and procure- two years ago. This is just the beginning, however. As the
The landscape of user authentication
ment. IAM grew organically in the past and tended to be man- Internet of Identities takes hold, CISOs will be intimately
is changing rapidly—and radically. A
aged by a loosely-coupled cabal of application developers, involved in crafting and enforcing identity policies. Look for
vanishing perimeter and the continuing
IT operations and security folks. As the internet of identities a much bigger focus on data privacy as well.
explosion of cloud-based applications
evolves, organizations will realize that they won’t be able to
and mobile devices are blurring old
use their existing IAM patchwork deployment to address Inter- The IT industry has been talking about identity-based comput- boundaries around organizations and
net of Identity scale or enable new business processes. At that ing and identity-based networking for years, but it was always networks. To keep up with the pace of
point, many organizations will make a next-generation identity more of a vision than reality. As the Internet of Identities evolves, change, lines of business are bypassing
infrastructure a high priority. Firms will also create positions this vision will come true—leading to a period of confusion, in- IT to deploy the applications they need
for chief identity officers, experienced individuals with the novation, and transformation. to meet their business objectives—and
right business and technical chops to transform their identity When will this happen? We are driving toward the on-ramp to- in the process creating more islands
infrastructure and champion a new IAM strategy. day, but the traffic on the highway is moving a lot faster than we of identity in a growing sea of shadow
• Identity runs to the cloud. The need for massive scale, think. In other words, the Internet of Identities and all that comes IT. And all of this is happening amid
perpetual connectivity, and processing power to monitor the with it are coming soon. increasingly rigorous data protection
regulation. This eBook explains how to
whole enchilada will drive large organizations to embrace
address today’s most popular authen-
cloud-based IAM services.
tication questions and ensure your
organization is prepared for the future
of authentication.
download now
3 of 8
eGuide IDG Enterprise is COMPUTERWORLD
4 of 8
eGuide IDG Enterprise is COMPUTERWORLD
Download
network traffic patterns will go awry, productivity and up- 2. Appoint an IAM committee and owner. white paper
time will suffer, and security teams will have to scramble to Application developers, IT operations, and security personnel do
catch up. need to work collectively on IAM, but someone must steer the
6 Steps to
ship. CIOs, CISOs, and business managers must find a senior Identity
Three strategies to address IoT device person who has the right business process, IT, and security
IAM challenges chops, and who can be accountable for driving an IAM/Internet Assurance
So, what’s needed? Mark recommends enterprise organizations of Identities strategy that promotes business enablement, opera- Now that so many applications have
do the following: tional efficiency, and security efficacy. moved to the cloud, and users continue
to embrace mobility, your organization
1. Assess their enterprise IAM tactics and strategies. 3. Adopt an identity-centric approach to business policies. must work toward fully embracing the
Organizations must find the disconnects, scalability issues, As organizations approach new business initiatives, they should new opportunities this boundaryless
process overlap, and ownership structure—and then work make IT and security decisions based upon the individuals involved, world presents. At the same time, you
on a three-year project to integrate and interoperate the the devices they’ll use, the locations they work from, and the applica- must manage the risk that comes with
such openness. It’s time to shift tradi-
whole enchilada. tions and data they need to get their jobs done. It’s all about connect-
tional thinking away from authentication
ing the right people to the right tools and blocking everyone else.
as a static one-time event and move
towards a more modern authentication
strategy that doesn’t require a trade-off
between security and convenience. This
white paper provides guidance on the
six key elements to identity assurance
and how to increase security while opti-
infographic mizing the end user’s experience.
download now
5 of 8
eGuide IDG Enterprise is COMPUTERWORLD
• 29 percent say they will monitor user activities more compre- I was talking to a CISO a few years ago about the prolifera-
hensively. In other words, they will be on the lookout for account tion of cloud and mobile computing. In describing his security
compromises and insider attacks. This may also be linked with response to these two trends, he said: “When I lose control of
user and entity behavior analytics (UEBA) deployment. devices and servers, I need to make sure to establish as much
6 of 8
eGuide IDG Enterprise is COMPUTERWORLD
Download
control as I can in two areas—identity management and data The ESG data demonstrates that some organizations are fol- newsletter
security.” So henceforth, my CISO friend plans to treat identity lowing this sagacious advice. It’s a good start. Mark and I will be
management (and data security) as new security perimeters. tracking how this trend progresses.
Gartner
Newsletter: The
Transformative
Power of Identity
This special report from RSA featuring
Gartner describes how digital transfor-
mation is changing the roles of identity
and access management (IAM) leaders
and how you can move from risk into
opportunity. Download this report for a
clear, actionable picture of how you and
your IAM team can adapt to accelerate
digital transformation.
download now
white paper
7 of 8
eGuide IDG Enterprise is COMPUTERWORLD
8 of 8