Skip to main content

Managing the Identity of Things in the Emerging IoT

Security is top of mind for most CIOs, and for good reason. Moreover, the emergence of new and pervasive technologies will present unique security challenges. A case in point: managing identities and access is going to become very important in the evolving Internet of Things (IoT).

However, the current form of Identity and Access Management (IAM) cannot provide the scale or manage the complexity that the IoT brings to the enterprise, according to the latest market study by Gartner.

"IAM leaders must reconsider how traditional approaches to cyber-security and IAM work in a world where devices and services are so abundant, in so many different forms and positioned at so many different points within the IT ecosystem," said Earl Perkins, research vice president at Gartner.

The growth of these technologies means that today's digital businesses must now require a way of defining and managing the identities of entities -- people, services and things -- within a single, secure framework.

Gartner believes that the IoT is not only about the introduction of different forms of networked devices into digital business moments -- it's a transformational approach to viewing and implementing processing, analytics, storage and communications.

The Identity of Things (IDoT) is a new extension to identity management that encompasses all entity identities, whatever form those entities take. These identities are then used to define relationships among the entities -- between a device and a human, a device and another device, a device and an application or service, a human and an application or service.

Since devices have not traditionally been part of IAM systems in this way, Gartner says that the IDoT must draw upon other existing management systems to aid in developing the single-system view for the IoT.

IT Asset Management (ITAM) and Software Asset Management (SAM) systems have traditionally managed IT and software assets of all types. The IDoT will assume some functional characteristics of ITAM and SAM within or integrated with IAM architecture, or be linked to ITAM as attribute stores.

"Existing identity data and policy planning give IAM leaders and technology service providers a narrow view of entities leading to a static approach that does not consider the dynamic relationships between them," concludes Perkins.

However, the concept of dynamic relationships is vital to the success of future IAM solutions. In fact, the concept of the relationship will become as important as the concept of identity is for IAM in the IDoT. It allows the IDoT to exist and become part of new responsibilities for IAM within the enterprise.

Popular posts from this blog

Software-Defined Infrastructure: The Platform of Choice

As more organizations adapt to a hybrid working model for their distributed workforce, enterprise CIOs and CTOs are tasked with delivering new productivity-enabling applications, while also seeking ways to effectively reduce IT cost, complexity, and risk. Traditional IT hardware infrastructure is evolving to more software-based solutions. The worldwide software-defined infrastructure (SDI) combined software market reached $12.17 billion during 2020 -- that's an increase of 5 percent over 2019, according to the latest market study by International Data Corporation (IDC). The market grew faster than other core IT technologies. The three technology pillars within the SDI market are: software-defined compute (53 percent of market value), software-defined storage controller (36 percent), and software-defined networking (11 percent). "Software-defined infrastructure solutions have long been popular for companies looking to eliminate cost, complexity, and risk within their data cente

Digital Identity Verification Market to Reach $16.7B

As more enterprise organizations embrace the ongoing transition to digital business transformation, CIOs and CTOs are adopting new technologies that enable the secure identification of individuals within their key stakeholder communities. A "digital identity" is a unique representation of a person. It enables individuals to prove their physical identity during transactions. Moreover, a digital identity is a set of validated digital attributes and credentials for online interactions -- similar to a person's identity within the physical world. Individuals can use a 'digital ID' to be verified through an authorized digital channel. Usually issued or regulated by a national ID scheme, a digital identity serves to identify a unique person online or offline. Digital Identity Systems Market Development Complementary to more traditional forms of identification, digital identity verification systems can enhance the authenticity, security, confidentiality, and efficiency of

Global Pandemic Accelerates the Evolution of Transportation

Given the current trends across the globe, organizations that depend upon the continued growth of personal vehicle ownership will need to consider a plan-B scenario. While some companies will be able to adapt, others may find that their traditional business model has been totally disrupted. According to the latest worldwide market study by Juniper Research, Mobility-as-a-Service (MaaS) will displace over 2.2 billion private car journeys by 2025 -- that's rising from 471 million in 2021. Juniper believes that for MaaS to enjoy widespread adoption, subscription or on-the-go packages need to offer a strong combination of transport modes along with feasible infrastructure changes, high potential for data collection and low barriers to MaaS deployments. Mobility-as-a-Service Market Development The concept of MaaS involves the provision of multi-modal end-to-end travel services through a single platform by which users can determine the best route and price according to real-time traffic