Google Analytics

Search This Blog

Friday, January 23, 2015

CA Technologies Predicts Identity and Access Management (IAM) Trends for 2015

1.)   Identity-aware organizations will adopt an “identity dial tone”:

Identity-aware organizations need to establish an “identity dial tone” to act as one source of identity truth to simplify app development, deployment and adoption as well as spur new innovation.

2.)   Universal authentication comes to your pocket or bag:

Increasingly, the mobile phone or mobile device will be used as a universal authenticator. The increased focus on authentication, driven by government and banking regulations, chip and PIN / signature technology, biometrics and new payment models will drive the demand for simpler and streamlined authentication.

Organizations will strive for “zero-touch authentication” to deliver as frictionless and password-free an experience for their customers and employees as possible, and the mobile device will be a key element.



3.)   A shift from identity management to identity access security:

A change in emphasis within the identity market will occur, based primarily on the impacts of last year’s breaches. The emphasis will shift from basic identity administration to identity security.

The majority of 2014 headline breaches hinged on compromised insider identities that opened organizations to data theft and application abuse. Protecting organizations against rogue or compromised insider identities will require new kinds of identity and access security that is intelligent, contextual and verifiable.

4.)   Mobility and the Internet of Things will drive the emergence of API-first architectures:

Basically, what this implies is that the IAM platform must support mobile and IOT.

5.)   Boards of directors will have increased visibility and involvement into the corporate security strategy:

Corporate executives and boards increasingly will be held accountable for breaches that damage their corporate brand. This will increase their level of involvement in security strategy and governance. Security will shift from an “IT problem” to an “executive problem.” Concerns over “denial of business” will drive increased board oversight.

No comments: