https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


Thinkstock

Identity access management systems

Identity access management systems are a security, interoperability and advertising game changer – and a massive risk

Companies want data about your identity. Will new security features and a superior user experience justify giving it to them?
  • Written by Jeremy Coward
  • 15th September 2017

When humans interact, we recognize one another through our identities, whether it’s a person’s voice, face or name.

At a time when executives and the public are realizing what cybersecurity professionals have known for years – that today’s standard security practices are inadequate for the age of technology and connectivity we live in – companies are searching for new tools to block hackers, or at least slow their momentum.

From the wide range of cybersecurity measures being touted, identity access management systems may be the most promising. Representatives from IBM, Ovum and the Information Security Forum (ISF) agreed as much on a security-focused panel session at Digital Futures 2017 in London this week.

Identity access management systems for network security

IBM’s Eric Maass was the most outspoken of the four panelists, calling identity “the new perimeter” for cybersecurity. Identity access management systems record aspects of a user’s identity and associate this with certain permissions, automatically giving them access to particular systems and devices. Where a physical location has boundaries that can be patrolled, he expects identities to play the same role in a digital setting.

Another benefit of identity management is the inherent interoperability it brings. The Internet of Things is increasingly associated with an overwhelming selection of vendors and solutions to choose from across industries and enterprises, market fragmentation that’s arguably making IoT’s security problems worse. Using information intrinsically associated with an individual to unlock devices and access systems introduces one point of relative stability, a method of access ubiquitous across all products.

[IoT Security Summit, co-located with Blockchain360 and Cloud Security Summit, explores how industry-wide security, privacy and trust can be established to unlock the full potential of IoT. Get your ticket now.]

Identity authentication also negates the need to remember passwords, reducing the risk of security fatigue – where the sheer quantity of passwords to remember either impacts company productivity, if users keep forgetting their password, or company security, if users frequently reuse passwords or keep record of them all in one place, on or offline.

“It’s more critical than ever to know who’s accessing your data,” ISF panelist Richard Absalom said. Blockchain has been embraced as a security measure by the likes of IBM, Microsoft and Cisco because it provides an irrefutable record of every transaction made on networks that use it. If there’s a breach, companies can backtrack to see if any unexpected transactions occurred. Verifying the identity of users has a similar appeal, giving a better idea of who’s accessed your network and when they joined. On the sidelines, there’s ongoing work to extend blockchain functionality to identity management, with advocates hoping this will give users greater control over how identity information is used and enable them to provide minimal information to prove identities in the near future.

Why companies really love identity management

There’s another reason why companies are particularly keen on embracing identity management as a security measure – they want the data.

The Internet of Things is exciting marketers everywhere, offering vastly improved personalization thanks to the wealth of data collected. Identity authentication is another data touchpoint, one providing information that’s personal to the user and extremely valuable to the service provider.

This extends to biometrics. The iPhone 5S demonstrated people are happy to have their fingerprint scanned and documented if it saves them a few seconds each time they unlock their handset. Now the latest iPhone models are bringing face recognition to the mass market. If identity management and even biometrics can totally negate the need for passwords and text verifications, it’s easy to believe users will happily part with plenty more of their personal data. Hence why using identity authentication as security measure will spell a big competitive advantage for the companies that implement it first.

Using identity might worsen our security woes

If identity data is valuable to companies, then it’s just as valuable to hackers. Identity management might bolster cybersecurity for businesses and consumers initially, but by simultaneously encouraging people to use aspects of their identity to access all their digital devices and storing that data with third parties, the stakes are raised massively. Obtaining this information is likely to give cybercriminals access to far more than the average password.

Using identity to log in improves security by reducing the chance of operator errors and security holes, but it won’t make systems impenetrable. “It’s only moving the bar up for attackers,” Absalom said. Encouraging the widespread use of identity management is going to require a lot of trust between businesses, users and the third parties willing to shoulder the responsibility.

The technology is there. But trust in the technology and those that encourage its use might not be – and going by the quantity, severity and ever-increasing frequency of cyberattacks on enterprises recently, there’s probably good reason for that.

Tags: Article Security Technologies

Related


  • IoT Security Firm to Acquire Medical Security Startup
    Claroty is set to acquire Medigate to grow its foothold in securing the Internet of Medical Things
  • Ransomware Attack Could Impact Paychecks
    The Kronos ransomware attack affected the company’s private cloud service over the weekend, knocking it offline just before the holidays
  • Image shows an abstract digital big data concept.
    BotenaGo Malware Targets Millions of IoT Devices
    AT&T Alien Labs identified the malware that has left millions of IoT devices exposed.
  • IoT Startup Raises $10M
    Platform aims to bolster network security with automated device configurations and visibility.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • IoT Device Security at the Edge Poses Unique Challenges
  • Zero-Trust Security for IoT: Establishing Rigorous Device Defenses
  • AI Ups the Ante for IoT Cybersecurity
  • Protecting Your Network Against Ripple20 Vulnerabilities

Roundups

View all

IoT Product Roundup: PTC, Nokia, Arm and More

19th May 2022

IoT Deals, Partnerships Roundup: Intel, Nauto, Helium and more

14th May 2022

IoT Product Roundup: Amazon, Synaptics, Urban Control and More

27th April 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Dylan Kennedy of EMQ

Embedded IoT World 2022: Dylan Kennedy of EMQ

Dylan Kennedy, EMQ’s VP of global operations, sat down with Chuck Martin at Embedded IoT World 2022.

Embedded IoT World 2022: Omdia’s Sang Oh Talks Vehicle Chip Shortage

Omdia’s automotive semiconductor analyst sits down with Chuck Martin at this year’s event

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

Explore Emerging Tech For Enterprises at @TechXLR8 2022 this June ➡️ Join us from 1-3 June in harnessing the pow… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Clearview AI has been fined $9.4 million for collecting images of people from social media platforms to add to its… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Swiss-startup Airyacht is developing an eponymously named vehicle that it says will take the luxury-yacht experienc… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

@Tesla’s #Autopilot being investigated once again following fatal crash in Newport Beach, California. iotworldtoday.com/2022/05/23/tes…

23rd May 2022
IoTWorldToday, IoTWorldSeries

A new Kansas law will enable #driverless deliveries from @Walmart and its partner @Gatik_AI. #AVs… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

Access a world of opportunity in 2022 with @IoTWorldToday ➡️ Now is time to unlock ROI, by accessing a global com… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

3D Home Printer to Build 72 Residences for National Homebuilder dlvr.it/SQhWSF https://t.co/XJOs70DqzH

19th May 2022
IoTWorldToday, IoTWorldSeries

Microsoft Ramping up Cybersecurity Service Offerings dlvr.it/SQhPR0 https://t.co/nYzaDRnyVY

19th May 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X