Skip to main content

Managing the Identity of Things in the Emerging IoT

Security is top of mind for most CIOs, and for good reason. Moreover, the emergence of new and pervasive technologies will present unique security challenges. A case in point: managing identities and access is going to become very important in the evolving Internet of Things (IoT).

However, the current form of Identity and Access Management (IAM) cannot provide the scale or manage the complexity that the IoT brings to the enterprise, according to the latest market study by Gartner.

"IAM leaders must reconsider how traditional approaches to cyber-security and IAM work in a world where devices and services are so abundant, in so many different forms and positioned at so many different points within the IT ecosystem," said Earl Perkins, research vice president at Gartner.

The growth of these technologies means that today's digital businesses must now require a way of defining and managing the identities of entities -- people, services and things -- within a single, secure framework.

Gartner believes that the IoT is not only about the introduction of different forms of networked devices into digital business moments -- it's a transformational approach to viewing and implementing processing, analytics, storage and communications.

The Identity of Things (IDoT) is a new extension to identity management that encompasses all entity identities, whatever form those entities take. These identities are then used to define relationships among the entities -- between a device and a human, a device and another device, a device and an application or service, a human and an application or service.

Since devices have not traditionally been part of IAM systems in this way, Gartner says that the IDoT must draw upon other existing management systems to aid in developing the single-system view for the IoT.

IT Asset Management (ITAM) and Software Asset Management (SAM) systems have traditionally managed IT and software assets of all types. The IDoT will assume some functional characteristics of ITAM and SAM within or integrated with IAM architecture, or be linked to ITAM as attribute stores.

"Existing identity data and policy planning give IAM leaders and technology service providers a narrow view of entities leading to a static approach that does not consider the dynamic relationships between them," concludes Perkins.

However, the concept of dynamic relationships is vital to the success of future IAM solutions. In fact, the concept of the relationship will become as important as the concept of identity is for IAM in the IDoT. It allows the IDoT to exist and become part of new responsibilities for IAM within the enterprise.

Popular posts from this blog

Anywhere, Anytime Workplace Demand for SASE

The ongoing adoption of flexible working models within the enterprise market has significant implications for typical IT organizations that must now support knowledge workers and front-line employees that operate outside the corporate network perimeter. The global COVID-19 pandemic created IT networking and security challenges. The expansion of the distributed workforce, an increasing reliance on cloud computing infrastructure, and the requirement to securely connect online employees -- wherever they choose to work, at any given moment in time. Legacy IT solutions that have rigid network underlays and a requirement for on-premises infrastructure cannot adequately deal with these trends. This 'Anywhere, Anytime Workplace' led to demand for new Secure Access Service Edge (SASE) solutions, with networking and security delivered as-a-service. Anywhere, Anytime Workplace Market Development   Although converging networking and security capabilities offer enterprises a promising solut

The Metaverse Raised Virtual Reality Interest

After years of slow growth and limited use cases, the Virtual Reality (VR) market is now forecast to grow significantly over the next five years. Consumer interest in VR games and media continues to grow after the COVID-19 pandemic accelerated activity. At the same time, the need for employee enablement and immersive content within the enterprise environment remains strong. According to the latest market study by ABI Research, over 90 million Head Mounted Display (HMD) shipments in 2027 will drive total VR market revenues to reach over $95 billion across hardware, software, and services. Virtual Reality Market Development "The virtual reality market is no stranger to false starts, with identifiable efforts in VR dating back to the 1980s and 1990s. While the technology never found purchase results, the increased capability of VR hardware combined with the demand for immersive content in numerous markets, presents a significant opportunity," says Eric Abbruzzese, research direc

Cloud Edge Computing Demand Continues to Grow

Public cloud computing solutions are moving closer to the edge of networks where CIOs and CTOs are hosting new apps. The edge journey is well underway for forward-looking organizations as they seek to connect with customers, improve operational efficiency, and adopt digital business technologies to drive innovation. The latest worldwide market study by International Data Corporation (IDC) found that three-quarters of organizations plan to increase their edge computing spending over the next two years with an average increase of 37 percent. A combination of factors is driving this increased spending at the edge. Cloud Edge Computing Market Development The performance requirements of expanding workloads and new use cases that leverage artificial intelligence (AI) and machine learning (ML) demand greater compute capacity at the edge. In addition, the amount of data being stored in edge locations are rapidly expanding, and organizations plan to keep this data longer. As a result, the numbe