ThirdSpace ThirdSpace
ThirdSpace Contact Us
Close 0 Reset Search Run Search What are you looking for? Type at least three characters to search. Filter Search Results
  • All Content
  • Blog
  • Page
  • Case Studies
  • Event
  • Resources
  • News
  • Careers
  • Access Centre
  • Technologies
  • Workshops
  • Service
  • Solutions
  • People
Load more
24 August 2018

Who moved my identity cheese?! What are the top 5 trends driving change in IAM?

Profile shot of Joe Liptrot.
Written by Joe Liptrot

“The only constant in life is change” - Heraclitus

We have all been there… After painstaking planning, you have built something of beauty – and then the world changes. This is just ‘another day in the office’ for identity and access management professionals.

That new application in the Cloud, increased governance demands, or the Board finally realising that you do indeed need to be more secure if you want to be able to work in different ways. It’s a challenge.

And your job isn’t getting any easier. The global demand for IAM is outstripping budget spending, and the skills gap is ever growing.

The global IAM market is expected to grow to USD $20.87 billion by the end of year 2022 with a compound annual growth rate of 14.8%.

What are the five key trends driving increases in IAM demand?

And how can IT departments and technologies adapt to overcome the challenges ahead?

5. It’s looking awfully cloudy out there

The explosion of cloud technology and cloud-based apps are driving a move away from traditional on-premises-only identities to cloud-based and hybrid Identity as a Service (IDaaS) solutions.

For B2E and B2P use cases, it is estimated that IDaaS offers 30% to 40% lower entry costs for IAM than comparable on-prem IAM solutions. As a result, demand for these cloud solutions has been and will continue to grow at 12% to 15% annually (The IAM Market Will Surpass $13 Billion By 2021, Forrester Report)

The provisioning, and administration, of these accounts and their inclusion as part of an identity life cycle must be considered when looking at deploying any IDaaS solution. The new system should also tie in with the existing on-premises life cycle, ensuring that the cloud and on-premises environment are joined up.

4. Yet more data governance and compliance is needed in the aftermath of GDPR

It’s here to stay… The strict rules and heavy fines imposed by the GDPR are now a key growth driver within the IAM market, as many organisations strive to improve and maintain high levels of regulatory compliance and data governance practices.

Back in 2016, an Ovum report of 366 top IT decision makers highlighted that two-thirds of businesses expect to see significant change in their global business strategies to accommodate new data privacy regulation, and that over 70% of respondents expect to increase spending in order to meet data sovereignty requirements.

It will be key to ensure that the compliance required to access the data is maintained at a high level. The specific users (whose identities are known) who have access to this data must be managed and maintained in line with their status within the organisation.

When they leave, it is removed; if they are suspended (or on sabbatical), then their access should also be curtailed. This must be auditable to ensure that compliance can be proven.

A buyer’s guide to Microsoft Enterprise Security

A buyer’s guide to Microsoft Enterprise Security

Remove the complexity from Microsoft’s comprehensive security technology ecosystem. Download the 43-page e-Guide today and understand:

  • What Microsoft security technologies exist – and their key features and benefits
  • How each technology integrates and works together to maximise your security
  • Microsoft 365 licensing requirements – including a handy infographic
Download e-Guide

3. BYOD policies bring new security challenges and drive demand for IAM

By 2020, 46% of the workforce will be made up of millennials[4] and they expect, no, they demand collaborative and connected ways of working! BYOD policies within businesses are on the rise as companies recognise the need to power mobile and flexible working.

As demand for BYOD from employees increases, and as CISOs continue to work towards the mantra of ‘anyone, any device, anywhere’, you can be sure this will drive changes in the IAM strategy – the cornerstone to security.

The ‘anyone’ in this mantra relates to approved users – whether employees, partners or clients; whether they are using their own or corporate devices to work appropriately. This will then allow the ‘right people’ to access the ‘right information’ when they need it.

2. The explosion of IoT presents a new identity challenge

Gartner predicts that connected ‘things’ in use worldwide will grow from 8.4 billion in 2017 to 20.4 billion by 2020[5]. Depending on what you read this could rise as high as 25 billion connected objects within the next five years.

With the proliferation of all these new digital identities, bi-passing the traditional firewall and perimeter security model, organisations are being forced to introduce structured security solutions with identity and IAM fundamentals at the core.

New strategies and techniques need to be developed to resolve the issue of IoT security, and many believe this needs to come from looking closer into the ‘Identity’ of things (IDoT) rather than looking at traditional user identities.

1. The end of the simple password

‘Get with the beat Baggy’ – it’s all about biometric logins, conditional access, and multi-factor authentication now. Gone are the days when the simple password met the security requirements for leading businesses to grant access to sensitive information.

Biometric logins running through something like Microsoft’s Enterprise Mobility + Security conditional access security solution, paired together with smart multi-factor authentication rules, is the holy grail for security professionals – and something that should be on the radar for IAM professionals as they look to develop future strategies to aid digital transformation.

Next, download the identity trends e-Guide to learn what’s driving demands for modern IAM.

Profile shot of Joe Liptrot.

About Joe Liptrot

Senior Architect

Responsible for ThirdSpace’s identity and access management practice, Joe is a member of both the leadership team and the technical leadership committee. You’ll frequently find him working onsite...


You may also like...


How the SolarWinds breach highlights the dangers of federated authentication – and what you can do to protect against it


What is Microsoft Identity Manager (MIM)? Everything you need to know


Uniting disparate directories: What is Azure AD Connect cloud provisioning?

Recent Blog Articles

View All
Related topics

A buyer’s guide to Microsoft security

Understand what each Microsoft technology does and how they all integrate.

Download 43-page Guide

Need some help?

Send us your questions or feedback.

Friendly folks are standing by!

Contact Us
Award-winning solutions Award-winning solutions

Eight-time winner of the Microsoft Partner of the Year Award for Identity Management, Enterprise Mobility, and Security and Compliance.

ThirdSpace Please upgrade your browser

You are seeing this because you are using a browser that is not supported. The ThirdSpace website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:

Windows Mac

Please note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.