In today’s blog, we continue with our theme on the Identity Access Manager, onto what the hot trends will be for this year. Here are the next two:
The Hot Trends for IAM by 2020
- Our daily interactions will define us:
With the IAM Systems of today, identifying an employee in a business or a corporation is done either with their legal name or an associated username (or perhaps even a combination of both) in order to grant access rights and permissions. But these days are soon to be numbered. Within the next few years, identities will be based upon the human interaction with other objects, both virtual and physical based. This phenomenon is known as the “Internet of Things”, or “IoT” for short. It can be specifically defined as the “ . . . concept of basically connecting any device with an on and off switch to the Internet (and/or to each other). This includes everything from cellphones, coffee makers, washing machines, headphones, lamps, wearable devices and almost anything else you can think of. This also applies to components of machines, for example a jet engine of an airplane or the drill of an oil rig.“ (SOURCE: http://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/#1f3000126828). Simply put, this means taking all of these different connections, and categorizing them into different activity streams. Thus, while an employee will still possess their username and legal name, they will be further identified by these different connections in which they engage in on a daily basis. With the world of technology becoming such a part of our everyday lives, the IAM System of tomorrow will have to take into consideration all of this when assigning access rights and privileges.
- IAM will reach its breaking point:
Let’s face it. We all use the Cloud for some reason or another. Whether we use it back up our data, store music and video files, or launch the next online store, it is all done in the Cloud. These days, very little is done with on premises (also known as “on-prem”) backup and storage solutions. It just costs too much money both in terms of IT assets and staff to have to manage them. While Cloud based assets are a sweet spot for Cyber attackers, it is the network connections to them which is the weakest link in the chain. For example, it is predicted that by 2020, there will be over 21 billion devices connected to the Cloud. This only exacerbates the threats of malware, spyware, and adware even more. To make matters even worse, employees and individuals will establish these connections from differing network locations. Thus, the IAM System of tomorrow will have to be working literally 24 X 7 X 365 in order to cope with all of this, and it is predicted that they will reach their breaking points if they are not monitored in real time. Thus, the IT Security administrator will have to be plugged into their Smartphone and access the IAM System via a mobile app in order to ensure it is running smoothly all of the time.
Keep in mind, whether you like it or not, the Internet of Things will soon be defining our very own personalities both in our personal and professional lives. That’s what the Internet has become!!!