“The only constant in life is change” - Heraclitus
We have all been there… After painstaking planning, you have built something of beauty – and then the world changes. This is just ‘another day in the office’ for identity and access management professionals.
That new application in the Cloud, increased governance demands, or the Board finally realising that you do indeed need to be more secure if you want to be able to work in different ways. It’s a challenge.
And your job isn’t getting any easier. The global demand for IAM is outstripping budget spending, and the skills gap is ever growing.
The global IAM market is expected to grow to USD $20.87 billion by the end of year 2022 with a compound annual growth rate of 14.8%.
And how can IT departments and technologies adapt to overcome the challenges ahead?
The explosion of cloud technology and cloud-based apps are driving a move away from traditional on-premises-only identities to cloud-based and hybrid Identity as a Service (IDaaS) solutions.
For B2E and B2P use cases, it is estimated that IDaaS offers 30% to 40% lower entry costs for IAM than comparable on-prem IAM solutions. As a result, demand for these cloud solutions has been and will continue to grow at 12% to 15% annually (The IAM Market Will Surpass $13 Billion By 2021, Forrester Report)
The provisioning, and administration, of these accounts and their inclusion as part of an identity life cycle must be considered when looking at deploying any IDaaS solution. The new system should also tie in with the existing on-premises life cycle, ensuring that the cloud and on-premises environment are joined up.
It’s here to stay… The strict rules and heavy fines imposed by the GDPR are now a key growth driver within the IAM market, as many organisations strive to improve and maintain high levels of regulatory compliance and data governance practices.
Back in 2016, an Ovum report of 366 top IT decision makers highlighted that two-thirds of businesses expect to see significant change in their global business strategies to accommodate new data privacy regulation, and that over 70% of respondents expect to increase spending in order to meet data sovereignty requirements.
It will be key to ensure that the compliance required to access the data is maintained at a high level. The specific users (whose identities are known) who have access to this data must be managed and maintained in line with their status within the organisation.
When they leave, it is removed; if they are suspended (or on sabbatical), then their access should also be curtailed. This must be auditable to ensure that compliance can be proven.
Remove the complexity from Microsoft’s comprehensive security technology ecosystem. Download the 43-page e-Guide today and understand:
By 2020, 46% of the workforce will be made up of millennials and they expect, no, they demand collaborative and connected ways of working! BYOD policies within businesses are on the rise as companies recognise the need to power mobile and flexible working.
As demand for BYOD from employees increases, and as CISOs continue to work towards the mantra of ‘anyone, any device, anywhere’, you can be sure this will drive changes in the IAM strategy – the cornerstone to security.
The ‘anyone’ in this mantra relates to approved users – whether employees, partners or clients; whether they are using their own or corporate devices to work appropriately. This will then allow the ‘right people’ to access the ‘right information’ when they need it.
Gartner predicts that connected ‘things’ in use worldwide will grow from 8.4 billion in 2017 to 20.4 billion by 2020. Depending on what you read this could rise as high as 25 billion connected objects within the next five years.
With the proliferation of all these new digital identities, bi-passing the traditional firewall and perimeter security model, organisations are being forced to introduce structured security solutions with identity and IAM fundamentals at the core.
New strategies and techniques need to be developed to resolve the issue of IoT security, and many believe this needs to come from looking closer into the ‘Identity’ of things (IDoT) rather than looking at traditional user identities.
‘Get with the beat Baggy’ – it’s all about biometric logins, conditional access, and multi-factor authentication now. Gone are the days when the simple password met the security requirements for leading businesses to grant access to sensitive information.
Biometric logins running through something like Microsoft’s Enterprise Mobility + Security conditional access security solution, paired together with smart multi-factor authentication rules, is the holy grail for security professionals – and something that should be on the radar for IAM professionals as they look to develop future strategies to aid digital transformation.
Next, download the identity trends e-Guide to learn what’s driving demands for modern IAM.
Responsible for ThirdSpace’s identity and access management practice, Joe is a member of both the leadership team and the technical leadership committee. You’ll frequently find him working onsite...
READ AUTHOR'S FULL BIO
Understand what each Microsoft technology does and how they all integrate.Download 43-page Guide
Send us your questions or feedback.
Friendly folks are standing by!
Eight-time winner of the Microsoft Partner of the Year Award for Identity Management, Enterprise Mobility, and Security and Compliance.
You are seeing this because you are using a browser that is not supported. The ThirdSpace website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:Windows
Please note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.