spot_img

Trends in IAM – A Look-in

Date:

Trending

With the new normal after the Covid pandemic, the Digital Security space in general and Identity and Access Management (IDAM) in particular has become a core topic of focus amongst corporates, government organizations, and individuals the world over.  

- Advertisement -

According to a Gartner study conducted in June 2020, Identity and Access Management spend worldwide this year (2019-20) is going to be 10.4 billion dollars which is a 5.8% increase from last year, whilst the overall security-related spending (covering the areas of Application Security, Data Security, Infrastructure Protection, Risk Management, Cloud Security, Network Security, Security Services combined) world-wide is going to see a growth of only 2.4% from last year.

Why there is an increase in IDAM spends this year? 

- Advertisement -

The primary reason being, increase in access to corporate assets & applications by genuine corporate users, from outside the corporate firewalls.   This could be primarily attributed to the work from home option given to corporate employees, due to the Covid pandemic.   Corporates want to make sure all their IAM systems are protected.

What could be some typical applications that are being accessed?

- Advertisement -

Some examples could be firewalls, ERP, CRM, Java/Dot Net, Legacy, Custom, Home-grown Applications, SaaS Applications, etc.

What is the common question that occurs to everyone, when we think of Identity and Access:

How can a person with the wrong identity should not have the right access or How can a person with a genuine identity (and access) go through such a maze of integrated systems (like Firewall, ERP, CRM, etc. systems) of his/her organization or even across other connected organizations in a secure way and gets his/her tasks accomplished, without a hacker stealing his access rights? 

What could go wrong if these applications accesses are hacked or compromised (either within or across organizations)?  

Admin/Root credentials of critical systems falling into the wrong hands, tokens being phished out and used for wrong purposes, user accounts of hackers getting created (as though they are genuine users) in the target applications enabling the hacker to gain access like a regular user, could be some disasters that are waiting to happen.   These hack-ins could cause potentially millions to billions of dollars lost in operating revenue of a major enterprise, if not attended to properly.

So, how does a typically Secure IDAM solution help in mitigating these risks? 

Primarily in two ways.  By establishing trust between these applications/systems and the user.  The second is by way of automating so that any policy that is validating the trust between the applications, is executed automatically resulting in a go or no-go decision regarding the user access to the applications.

How are these 2 objectives achieved by modern IAM systems? 

Primarily the application (say Application A) that needs to grant access will communicate the terms of such access to the application (say Application B) from where the user is requesting access.  Once the terms are agreed upon by both applications, they make sure they communicate the credentials (say a password or a token or a secret key or encrypted payload that contains the user information) automatically between them to make a ‘Go’ or ‘No Go’ decision regarding the access.

Summarizing, we see that enterprises worldwide are focusing on securing their identity-based access mgmt. systems post-Covid, as institutional access to genuine systems, has increased to a great extent, and hence proportionately their IAM spends are also increasing.  

Given this scenario, we see that even though the IDAM systems are maturing, we also see a trend where organizations are increasingly going for Identity support contracts to protect the systems (on a 24×7 basis) even after they have deployed a secure, integrated IDAM solution either in the cloud or on-premise.   This they do to make sure APIs, Connectors, keys, secrets, ports, payloads, user accounts, identity-based token transport are operating at the most secure level.  

But still, there will be a constant need for more innovative solutions to address the risks that are cropping up, as hackers are getting more inventive daily.  But for now, we can say we are systematically covering these risks with the help of modern IDAM solutions.

THE SNAPSHOTS

Sign up to get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.

- Advertisement -
Raj Srinivas
Raj Srinivas
Primarily from a strong security and product engineering background, he has been the principal architect of MISP (Multi-Domain Identity Services Platform) & CIE (Cloud ID Exchange) – in-house IAM & Security products at 8K Miles.

More Latest Stories

More Articles

Techugo Appoints Akshay Gupta as Vice President of IT for Global Markets

In a move to expand into new markets, Techugo, a global mobile application and digital transformation company, has appointed Akshay Gupta as Vice President...

Foreign Secretary Cooper Denies UK’s Role in U.S. Operation Against Venezuela’s Maduro

The British Foreign Secretary, Yvette Cooper, said the UK was not involved in the recent U.S. operation targeting Venezuela, including the reported capture of President Nicolás Maduro and his wife, Silvia Flores. Addressing Parliament, Cooper said, “The United Kingdom played no role in the U.S....

6 Realities Every Independent Professional Eventually Faces

Choosing to work independently is a dream for many. The freedom to set your...

US President Trump Says PM Modi “Knew I Was Not Happy,” Links India’s Russian Oil Import Cuts to Tariff Threats

US President Donald Trump praised Indian Prime Minister Narendra Modi for what he described...

NCB Advises Indian Travellers to Seek Clearance for Carrying Medicines to Saudi Arabia

The Narcotics Control Bureau has advised Indian travellers to obtain the required approvals before...

Why Edge Data Centres are India’s Next Growth Frontier

India's digital economy has entered a stage where promoting growth is no longer sufficient,...

India, Pakistan Share Details of Prisoners and Fishermen Held in Custody

India and Pakistan today exchanged the lists of civilian prisoners and fishermen in each...

India, Pakistan Exchange List of Nuclear Facilities Under Bilateral Agreement

India and Pakistan today exchanged the list of Nuclear Installations and facilities covered under...

India Extends Textile PLI Application Deadline to March 31

India has extended the deadline for submission of fresh applications under the Production Linked Incentive (PLI) Scheme for Textiles until March 31 this year. The...

Scaling Conversations: Superbot AI’s Sarvagya Mishra on Building Regional Voice AI for India’s Linguistic Markets

Speaking with TechGraph, Sarvagya Mishra, Founder and Director of Superbot, discussed how India’s shift...

The Hidden Business Layer Behind IoT Connectivity

When people talk about the Internet of Things, the focus is usually on devices....

The Shift to Intelligent Hiring: HunarAI’s Krishna Khandelwal on How AI Is Reshaping Recruitment in India

In an interaction with TechGraph, Krishna Khandelwal, Founder and CEO of Hunar.AI, outlined how...

Rewiring Academic Research: MBU’s Dr. T.V.V. Satyanarayana on How IECom Is Shaping India’s Intelligent Electronics Agenda

Speaking with TechGraph, Dr. T.V.V. Satyanarayana, Professor at Mohan Babu University (MBU), discussed how...

Building a Future-Ready Portfolio in a Digitally Driven Economy

The rapidly changing investment landscape in India has the nation's fast-growing digital economy at its center. Technology is affecting how companies operate, how consumers...

Why BFSI Needs Generative AI, Not Rule Engines

The Banking, Financial Services, and Insurance (BFSI) sector has been using rule engines for decision automation, workflow management, and regulatory compliance for decades. These systems, based on predefined logic and static if-then conditions, worked in a fairly predictable financial environment. However, the present-day BFSI scenario...

How Unified Intelligence Is Transforming the Future of Device Security

Device security has always been a balancing act; protecting sensitive data without slowing the...

Enterprise Blind Spots: 3 Cubed’s Shammik Gupta on Building a Digital Twin for Real Operational Clarity

Speaking with TechGraph, Shammik Gupta, Founder of 3 Cubed, discussed how enterprises invested in...

How Self-Service Analytics Is Reshaping Everyday Business Decisions

For years, analytics ran on a predictable cycle. Business teams raised requests and waited...

How can mid-career professionals transition into AI-assisted roles without going back to college?

Artificial intelligence is reshaping industries worldwide, from healthcare to finance, marketing, logistics, and education....

Adda247’s Bimaljeet Singh Bhasin on Career247 and the Push for Job-Ready Education

In an interview with TechGraph, Bimaljeet Singh Bhasin, CEO of Skilling and Higher Education...

The Future of Preventive Healthcare in India and the Role of Digital Platforms

India is set to decide on the ongoing healthcare evolution, where the main point...

Rethinking Medical Training: MedLern Co-founder Deepak Sharma on Digital Resuscitation Learning and Patient Safety

Speaking with TechGraph, Deepak Sharma, Co-founder and CEO of MedLern, discussed how traditional instructor-led...

Home Improvements That Benefit You Today and Boost Value Tomorrow

When it comes to home improvements, the best upgrades are those that provide immediate...

Vimal Singh on ReadyAssist’s Role in Modernising Roadside Assistance in India

Speaking with TechGraph, Vimal Singh, Founder of ReadyAssist, discussed how traditional roadside assistance models...

The Shift to Intelligent Hiring: HunarAI’s Krishna Khandelwal on How AI Is Reshaping Recruitment in India

In an interaction with TechGraph, Krishna Khandelwal, Founder and CEO of Hunar.AI, outlined how...

Why Solar Panels Are a Worthwhile Investment

With the increasing urgency to transition to sustainable energy sources, investing in solar panels...

Tech Driven Urban Growth: How Digital Innovation is Shaping Sustainable Real Estate in India’s Emerging Cities

India stands at an important moment in its urban journey. The country’s largest cities...

Ensuring Your Building is Technologically Modern and Eco-Friendly

In the contemporary world, where the balance between innovation and sustainability is paramount, modernizing...

Serhiy Tokarev on the Four Hidden Advantages of the CEE Startup Ecosystem

Central and Eastern Europe (CEE) has changed a lot in the last ten years....

Rewiring Academic Research: MBU’s Dr. T.V.V. Satyanarayana on How IECom Is Shaping India’s Intelligent Electronics Agenda

Speaking with TechGraph, Dr. T.V.V. Satyanarayana, Professor at Mohan Babu University (MBU), discussed how...

Home Improvements That Benefit You Today and Boost Value Tomorrow

When it comes to home improvements, the best upgrades are those that provide immediate...

India’s AIF Shift: Steptrade Capital’s Kresha Gupta on the Evolution of Alternative Investments in India

Speaking with TechGraph, Kresha Gupta, Director and Fund Manager at Steptrade Capital, discussed how...

Vimal Singh on ReadyAssist’s Role in Modernising Roadside Assistance in India

Speaking with TechGraph, Vimal Singh, Founder of ReadyAssist, discussed how traditional roadside assistance models...