https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Thinkstock

Identity access management systems

Identity access management systems are a security, interoperability and advertising game changer – and a massive risk

Companies want data about your identity. Will new security features and a superior user experience justify giving it to them?
  • Written by Jeremy Coward
  • 15th September 2017

When humans interact, we recognize one another through our identities, whether it’s a person’s voice, face or name.

At a time when executives and the public are realizing what cybersecurity professionals have known for years – that today’s standard security practices are inadequate for the age of technology and connectivity we live in – companies are searching for new tools to block hackers, or at least slow their momentum.

From the wide range of cybersecurity measures being touted, identity access management systems may be the most promising. Representatives from IBM, Ovum and the Information Security Forum (ISF) agreed as much on a security-focused panel session at Digital Futures 2017 in London this week.

Identity access management systems for network security

IBM’s Eric Maass was the most outspoken of the four panelists, calling identity “the new perimeter” for cybersecurity. Identity access management systems record aspects of a user’s identity and associate this with certain permissions, automatically giving them access to particular systems and devices. Where a physical location has boundaries that can be patrolled, he expects identities to play the same role in a digital setting.

Another benefit of identity management is the inherent interoperability it brings. The Internet of Things is increasingly associated with an overwhelming selection of vendors and solutions to choose from across industries and enterprises, market fragmentation that’s arguably making IoT’s security problems worse. Using information intrinsically associated with an individual to unlock devices and access systems introduces one point of relative stability, a method of access ubiquitous across all products.

[IoT Security Summit, co-located with Blockchain360 and Cloud Security Summit, explores how industry-wide security, privacy and trust can be established to unlock the full potential of IoT. Get your ticket now.]

Identity authentication also negates the need to remember passwords, reducing the risk of security fatigue – where the sheer quantity of passwords to remember either impacts company productivity, if users keep forgetting their password, or company security, if users frequently reuse passwords or keep record of them all in one place, on or offline.

“It’s more critical than ever to know who’s accessing your data,” ISF panelist Richard Absalom said. Blockchain has been embraced as a security measure by the likes of IBM, Microsoft and Cisco because it provides an irrefutable record of every transaction made on networks that use it. If there’s a breach, companies can backtrack to see if any unexpected transactions occurred. Verifying the identity of users has a similar appeal, giving a better idea of who’s accessed your network and when they joined. On the sidelines, there’s ongoing work to extend blockchain functionality to identity management, with advocates hoping this will give users greater control over how identity information is used and enable them to provide minimal information to prove identities in the near future.

Why companies really love identity management

There’s another reason why companies are particularly keen on embracing identity management as a security measure – they want the data.

The Internet of Things is exciting marketers everywhere, offering vastly improved personalization thanks to the wealth of data collected. Identity authentication is another data touchpoint, one providing information that’s personal to the user and extremely valuable to the service provider.

This extends to biometrics. The iPhone 5S demonstrated people are happy to have their fingerprint scanned and documented if it saves them a few seconds each time they unlock their handset. Now the latest iPhone models are bringing face recognition to the mass market. If identity management and even biometrics can totally negate the need for passwords and text verifications, it’s easy to believe users will happily part with plenty more of their personal data. Hence why using identity authentication as security measure will spell a big competitive advantage for the companies that implement it first.

Using identity might worsen our security woes

If identity data is valuable to companies, then it’s just as valuable to hackers. Identity management might bolster cybersecurity for businesses and consumers initially, but by simultaneously encouraging people to use aspects of their identity to access all their digital devices and storing that data with third parties, the stakes are raised massively. Obtaining this information is likely to give cybercriminals access to far more than the average password.

Using identity to log in improves security by reducing the chance of operator errors and security holes, but it won’t make systems impenetrable. “It’s only moving the bar up for attackers,” Absalom said. Encouraging the widespread use of identity management is going to require a lot of trust between businesses, users and the third parties willing to shoulder the responsibility.

The technology is there. But trust in the technology and those that encourage its use might not be – and going by the quantity, severity and ever-increasing frequency of cyberattacks on enterprises recently, there’s probably good reason for that.

Tags: Article Security Technologies

Related


  • IoT security
    IoT Device Security: Risk Assessment, Hygiene Are Key
    As devices and data proliferate at the edge of the network, IT pros have encountered new challenges in securing enterprise IT systems.
  • Five Principles in a Zero-Trust Security Approach to IoT
    IoT devices have created vulnerability for IT networks, but a zero-trust security approach can lock down attack vectors. Here are five key principles.
  • Tactics for Successfully Selling IoT Technologies
    While this year has proven the value of digitization, many enterprises need persuasion. Experts discuss strategies for successfully selling IoT.
  • LynxSecure Datasheet
    LynxSecure is a tiny separation kernel that can be programmed to partition a modern processor into secure virtual environments. It is not RTOS. It is not a traditional hypervisor. It is smaller than a microkernel (as small as 15Kb). LynxSecure requires and leverages the hardware virtualization capabilities of certain modern CPUs to (1) establish secure […]

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Cybersecurity Crisis Management During the Coronavirus Pandemic
  • In Industrial Realm, Trustworthy Software Means Safety
  • Integrating Analog Controls into IIoT Systems
  • Dell Sells RSA Security for More Than $2 Billion

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

Smart Manufacturing With IoT

4th December 2020

Ensuring Safety & Security of Pharmaceutical Supply Chain: A Case Study

4th December 2020

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Real Cyber Threats and Best Practices Cyber Security Strategy and Solutions for Smart Manufacturing

1st December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

At #CES2021, @verizon touts #5Gconnectivit as the key to digitization in pandemic times. But experts say there are… twitter.com/i/web/status/1…

12th January 2021
IoTWorldToday, IoTWorldSeries

The #privateLTE market is due to grown, given increased needs for #networkperformance and #networkbandwidth.… twitter.com/i/web/status/1…

12th January 2021
IoTWorldToday, IoTWorldSeries

As #IoTdevices and #IoTdata proliferate at the edge of the network, IT pros need to take these steps for… twitter.com/i/web/status/1…

11th January 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X