Trends in IAM – A Look-in

Date:

Trending

With the new normal after the Covid pandemic, the Digital Security space in general and Identity and Access Management (IDAM) in particular has become a core topic of focus amongst corporates, government organizations, and individuals the world over.  

According to a Gartner study conducted in June 2020, Identity and Access Management spend worldwide this year (2019-20) is going to be 10.4 billion dollars which is a 5.8% increase from last year, whilst the overall security-related spending (covering the areas of Application Security, Data Security, Infrastructure Protection, Risk Management, Cloud Security, Network Security, Security Services combined) world-wide is going to see a growth of only 2.4% from last year.

Why there is an increase in IDAM spends this year? 

The primary reason being, increase in access to corporate assets & applications by genuine corporate users, from outside the corporate firewalls.   This could be primarily attributed to the work from home option given to corporate employees, due to the Covid pandemic.   Corporates want to make sure all their IAM systems are protected.

What could be some typical applications that are being accessed?

Some examples could be firewalls, ERP, CRM, Java/Dot Net, Legacy, Custom, Home-grown Applications, SaaS Applications, etc.

What is the common question that occurs to everyone, when we think of Identity and Access:

How can a person with the wrong identity should not have the right access or How can a person with a genuine identity (and access) go through such a maze of integrated systems (like Firewall, ERP, CRM, etc. systems) of his/her organization or even across other connected organizations in a secure way and gets his/her tasks accomplished, without a hacker stealing his access rights? 

What could go wrong if these applications accesses are hacked or compromised (either within or across organizations)?  

Admin/Root credentials of critical systems falling into the wrong hands, tokens being phished out and used for wrong purposes, user accounts of hackers getting created (as though they are genuine users) in the target applications enabling the hacker to gain access like a regular user, could be some disasters that are waiting to happen.   These hack-ins could cause potentially millions to billions of dollars lost in operating revenue of a major enterprise, if not attended to properly.

So, how does a typically Secure IDAM solution help in mitigating these risks? 

Primarily in two ways.  By establishing trust between these applications/systems and the user.  The second is by way of automating so that any policy that is validating the trust between the applications, is executed automatically resulting in a go or no-go decision regarding the user access to the applications.

How are these 2 objectives achieved by modern IAM systems? 

Primarily the application (say Application A) that needs to grant access will communicate the terms of such access to the application (say Application B) from where the user is requesting access.  Once the terms are agreed upon by both applications, they make sure they communicate the credentials (say a password or a token or a secret key or encrypted payload that contains the user information) automatically between them to make a ‘Go’ or ‘No Go’ decision regarding the access.

Summarizing, we see that enterprises worldwide are focusing on securing their identity-based access mgmt. systems post-Covid, as institutional access to genuine systems, has increased to a great extent, and hence proportionately their IAM spends are also increasing.  

Given this scenario, we see that even though the IDAM systems are maturing, we also see a trend where organizations are increasingly going for Identity support contracts to protect the systems (on a 24×7 basis) even after they have deployed a secure, integrated IDAM solution either in the cloud or on-premise.   This they do to make sure APIs, Connectors, keys, secrets, ports, payloads, user accounts, identity-based token transport are operating at the most secure level.  

But still, there will be a constant need for more innovative solutions to address the risks that are cropping up, as hackers are getting more inventive daily.  But for now, we can say we are systematically covering these risks with the help of modern IDAM solutions.

THE SNAPSHOTS, IN YOUR INBOX

Get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.

Support our independent journalism PayPal (Outside India) For PayU (For Indian Readers).

Raj Srinivas
Raj Srinivas
Primarily from a strong security and product engineering background, he has been the principal architect of MISP (Multi-Domain Identity Services Platform) & CIE (Cloud ID Exchange) – in-house IAM & Security products at 8K Miles.

More Latest Stories

More Articles

Relata’s Hyper-Realism: CEO Samudragupta Talukdar On Personalized Home Buying Experiences

In an exclusive conversation with TechGraph, Samudragupta Talukdar, Founder and CEO of Relata, a real estate technology company, outlined how the company is reshaping...

Godrej Capital’s Gen AI Plan: CTO Jyothirlatha B on SAKSHAM AI and the Future of Financial Services

Speaking to TechGraph, Godrej Capital CTO Jyothirlatha B shared how the company is harnessing GenAI to accelerate credit assessments and enhance customer service. She also discussed the upcoming launch of SAKSHAM AI, a platform designed to streamline operations and boost efficiency across credit management,...

Preparing for a Data-Driven Future: How the GRE Assesses Academic and Analytical Readiness

As sectors such as artificial intelligence (AI) and machine learning continue to grow and...

Exploring the broad appeal of football: from fashion to video games

Football, often called the world's game, goes far beyond the pitch. Its influence extends...

BProTrade: Global Expansion Explained

December 2024 marks a pivotal time in the world of online trading. With Bitcoin...

How Generative AI is Shaping Voicebot Capabilities

The advent of Generative AI is here to revolutionize the technological landscape and reimagine...

‘Historic day for the Middle East’: PM Netanyahu On Syria’s Assad Regime Collapse

Israeli Prime Minister Benjamin Netanyahu, in a video statement released on Sunday, described the...

Decentralizing Cardiac Care: Sunfox Technologies’ Rajat Jain on the Spandan ECG Impact

During an interview with the TechGraph editorial team, Sunfox Technologies' Founder and CEO, Rajat...

Neon54 Casino Review: A Vibrant Gaming Experience

When it comes to striking the perfect balance between entertainment and innovation, Neon54 Casino hits all the right notes. This online casino, licensed by...

Boson Whitewater, Citadines OMR Chennai to Launch First-of-its-Kind Wastewater Recycling System

Boson Whitewater, a water utility company that converts STP-treated water into high-quality potable water,...

Jungle Camps India Limited Sets IPO Price Band at ₹68-₹72 per Share

Jungle Camps India Limited (JCIL), an India-based ecological hospitality service provider on Thursday announced...

Crypto Market Crosses $3.08 Trn, Bitcoin Hits $91,616, Litecoin Drops Below $90

The cryptocurrency market surged to a total valuation of $3.08 trillion on Monday, with...
00:56:42

Plan for Change: UK PM Keir Starmer Outlines Six Point Plans for Housing, NHS, Policing, and More

London, UK — The United Kindom PM and Labour Party leader Keir Starmer on...

Top Trends in Web3 Platforms for Forward-Thinking Entrepreneurs

The digital landscape is evolving rapidly, and Web3 platforms are leading this transformation. For forward-thinking entrepreneurs, staying informed about these technological trends is essential...

Benjamin Netanyahu: Thank You President Donald Trump for Calling Hamas to Release Hostages

Israeli Prime Minister Benjamin Netanyahu on Tuesday expressed his gratitude to U.S. President-Elect Donald Trump for his recent call for Hamas to release hostages. https://open.spotify.com/episode/6xpUQdGpNQUkwHNPXP7WgP?si=ro44gKgxR1yn6qBbj6iXpw "I want to thank President Trump for his strong statement yesterday about the need for Hamas to release the hostages," Netanyahu...

Titan Intech Ltd To Secure Rs 200 Cr via NCDs

Titan Intech Limited, a BSE-listed company specializing in Embedded Manufacturing Services (EMS) for OEM/ODM...

Ensuring Fair Play: AIGF CEO Roland Landers on Promoting Skill-Based Gaming in India

During an interview with TechGraph, Roland Landers, CEO of the All India Gaming Federation...

Discover the Features of Melbet’s Mobile App for Indian Bettors

The Melbet mobile application has been designed to cater to the growing community of...

How AI is Transforming Traditional Business Roles

Artificial Intelligence has already had a significant impact on businesses and has made data-driven...

The Impact of Real-Time Market Data Solutions on Informed Trading Decisions

The world of finance isn’t stagnant; it is dynamic and ever-evolving. Every second, a...

AI and Workplace Equality for Women in the Digital Era

As society heads toward an age dominated by technology, a key question remains: will...

WeVOIS Lab’s Abhinav Vashistha On Shaping the Future of Waste Management with AI

During an interview with TechGraph, Abhinav Vashistha, Co-Founder of WeVOIS Lab, discusses how it...

The Hidden World of Mega888 APK: What Casual Players Are Missing Out On

Mega888 APK is well-known among online casino enthusiasts for its thrilling games and easy-to-navigate...

Indusface Launches CyberShiksha program to Educate Students on Cybersecurity

Indusface, a leading application security provider for SaaS solutions, has launched CyberShiksha, a national...

Crypto Market Crosses $3.08 Trn, Bitcoin Hits $91,616, Litecoin Drops Below $90

The cryptocurrency market surged to a total valuation of $3.08 trillion on Monday, with...

The Evolution of Gaming: From Traditional to Immersive Online Experiences

Gaming has undergone a remarkable transformation over the decades, evolving from basic, tactile forms...

The Role of Health Plans with Preventive Care in Reducing Financial Risk

In an era where healthcare costs are spiraling and chronic conditions are on the...

Best Trading Platforms for Forex: An In-Depth Guide

If you’re looking to dive into forex trading, choosing the right trading firms are...

Unexpected Tips To Help Maintain Your Vehicle’s Condition

When it comes to prolonging the life of your vehicle, the condition of your...
00:56:42

Plan for Change: UK PM Keir Starmer Outlines Six Point Plans for Housing, NHS, Policing, and More

London, UK — The United Kindom PM and Labour Party leader Keir Starmer on...

The Hidden World of Mega888 APK: What Casual Players Are Missing Out On

Mega888 APK is well-known among online casino enthusiasts for its thrilling games and easy-to-navigate...

The Importance of Zero-Trust Security Models in Safeguarding Data

In an age where cyberattacks grow more sophisticated by the day, traditional security models...

Indusface Launches CyberShiksha program to Educate Students on Cybersecurity

Indusface, a leading application security provider for SaaS solutions, has launched CyberShiksha, a national...