Trends in IAM – A Look-in

Date:

Trending

With the new normal after the Covid pandemic, the Digital Security space in general and Identity and Access Management (IDAM) in particular has become a core topic of focus amongst corporates, government organizations, and individuals the world over.  

- Advertisement -

According to a Gartner study conducted in June 2020, Identity and Access Management spend worldwide this year (2019-20) is going to be 10.4 billion dollars which is a 5.8% increase from last year, whilst the overall security-related spending (covering the areas of Application Security, Data Security, Infrastructure Protection, Risk Management, Cloud Security, Network Security, Security Services combined) world-wide is going to see a growth of only 2.4% from last year.

Why there is an increase in IDAM spends this year? 

The primary reason being, increase in access to corporate assets & applications by genuine corporate users, from outside the corporate firewalls.   This could be primarily attributed to the work from home option given to corporate employees, due to the Covid pandemic.   Corporates want to make sure all their IAM systems are protected.

What could be some typical applications that are being accessed?

Some examples could be firewalls, ERP, CRM, Java/Dot Net, Legacy, Custom, Home-grown Applications, SaaS Applications, etc.

What is the common question that occurs to everyone, when we think of Identity and Access:

How can a person with the wrong identity should not have the right access or How can a person with a genuine identity (and access) go through such a maze of integrated systems (like Firewall, ERP, CRM, etc. systems) of his/her organization or even across other connected organizations in a secure way and gets his/her tasks accomplished, without a hacker stealing his access rights? 

- Advertisement -

What could go wrong if these applications accesses are hacked or compromised (either within or across organizations)?  

Admin/Root credentials of critical systems falling into the wrong hands, tokens being phished out and used for wrong purposes, user accounts of hackers getting created (as though they are genuine users) in the target applications enabling the hacker to gain access like a regular user, could be some disasters that are waiting to happen.   These hack-ins could cause potentially millions to billions of dollars lost in operating revenue of a major enterprise, if not attended to properly.

So, how does a typically Secure IDAM solution help in mitigating these risks? 

Primarily in two ways.  By establishing trust between these applications/systems and the user.  The second is by way of automating so that any policy that is validating the trust between the applications, is executed automatically resulting in a go or no-go decision regarding the user access to the applications.

How are these 2 objectives achieved by modern IAM systems? 

Primarily the application (say Application A) that needs to grant access will communicate the terms of such access to the application (say Application B) from where the user is requesting access.  Once the terms are agreed upon by both applications, they make sure they communicate the credentials (say a password or a token or a secret key or encrypted payload that contains the user information) automatically between them to make a ‘Go’ or ‘No Go’ decision regarding the access.

Summarizing, we see that enterprises worldwide are focusing on securing their identity-based access mgmt. systems post-Covid, as institutional access to genuine systems, has increased to a great extent, and hence proportionately their IAM spends are also increasing.  

Given this scenario, we see that even though the IDAM systems are maturing, we also see a trend where organizations are increasingly going for Identity support contracts to protect the systems (on a 24×7 basis) even after they have deployed a secure, integrated IDAM solution either in the cloud or on-premise.   This they do to make sure APIs, Connectors, keys, secrets, ports, payloads, user accounts, identity-based token transport are operating at the most secure level.  

- Advertisement -

But still, there will be a constant need for more innovative solutions to address the risks that are cropping up, as hackers are getting more inventive daily.  But for now, we can say we are systematically covering these risks with the help of modern IDAM solutions.

THE SNAPSHOTS, IN YOUR INBOX

Get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.

Support our independent journalism PayPal (Outside India) For PayU (For Indian Readers).

Raj Srinivas
Raj Srinivas
Primarily from a strong security and product engineering background, he has been the principal architect of MISP (Multi-Domain Identity Services Platform) & CIE (Cloud ID Exchange) – in-house IAM & Security products at 8K Miles.

More Latest Stories

More Articles

Pokarna Engineered Stone Limited Commits Rs 440 Crores for New Bretonstone Line

Pokarna Engineered Stone Limited (PESL) said on Tuesday it will invest Rs. 440 crore to expand production capabilities at its Mekaguda facility in Telangana....

Coinbase launches COIN50 Index To Track Top 50 Cryptos On its Exchange

Leading crypto trading platform Coinbase on Tuesday announced the launch of the Coinbase 50 Index (COIN50), a regulated cryptocurrency benchmark designed to provide transparent and reliable exposure to the crypto market. Developed in partnership with Coinbase Asset Management and Market Vector Indexes, the new index...

Donald Trump To Shut Department of Education; Plans To Shift Responsibilities To States

President-elect Donald Trump announced on Monday that his administration intends to close the Department...

The Trump Effect: Crypto Market Hits $3 Trillion Market Cap; Bitcoin Surges $87K, While Ethereum Stood At $3k

Following Donald Trump's presidential election victory, the cryptocurrency market surged, reaching a whopping $3.02...
00:04:07

Protests Erupts in Valencia Over Deadly Floods in Eastern Spain

Over ten thousand people took to the streets of Valencia to protest against the...

UltraverseNFT Launches Sandalwood backed NFT for Eco-Conscious Investors

UltraverseNFT is proud to introduce its groundbreaking Sandalwood NFTs, designed to redefine eco-conscious investments...

4 Key Ways Robotics May Change Warehouse Operations by 2030

The landscape of warehouse operations is poised for significant transformation by 2030 with the...

VIDEO: Israeli PM Netanyahu Visits Lebanese Border, Promises Strong Action Against Hezbollah

During a recent visit to the Lebanese border, Israel's Prime Minister Benjamin Netanyahu highlighted...
00:01:10

Tom Homan Old Video Goes Viral, After Donald Trump Taps Him As Border Czar

An old video of Tom Homan, former acting head of US Immigration and Customs Enforcement (ICE), went viral on social media after President-Elect Donald...

“I Will End the War in Gaza,” Kamala Harris to Arab American Community

In a final bid to win over Arab American voters in the closing stages...

FULL SPEECH: Cardi B Addresses Kamala Harris Rally In Wisconsin

Singer Cardi B addressed a rally in Milwaukee, Wisconsin, showing her support for presidential...

Customer Sentiment Analysis in Retail Banking: Leveraging Speech Analytics for Deeper Insights

Jeff Bezos, the Founder of Amazon, famously stated, “It is not the customer’s job...
00:03:45

US President Biden Apologies To Native Indians For Horrific Boarding School Policy

During a visit to the Gila River Indian Community in Arizona, President Joe Biden...
00:00:25

Kriya: PM Netanyahu Closely Monitors ‘Military Operations’ On Iran

The Israeli Prime Minister's Office has released a new video showing Prime Minister Benjamin Netanyahu and Defense Minister Yoav Gallant closely monitoring the ongoing...

Iran Should Not Respond To Israeli Attack: UK PM Keir Starmer

The United Kingdom's Prime Minister Keir Starmer has requested Iran to avoid retaliation after Israel conducted airstrikes on several military sites in Tehran overnight. Speaking at the press conference in Samoa, the prime minister said, "Israel has the right to defend itself against Iranian aggression....

APP Reviews: Bengali Betting Sites

Recognizing the increasing demand for an exhilarating and convenient gambling experience in the Bengali...

Interactive Learning: Elevating Concept Clarity Through Online Education

In today’s digital age, virtual learning has taken center stage, with live online lessons...
00:00:21

‘Not Our King’ Australian Politician Lidia Thorpe Heckled King Charles

Following King Charles' keynote speech in the Australian parliament, Senator Lidia Thorpe accused the...
00:00:00

Live: UN Security Council Meeting on Russia Ukraine Security

The members of the United Nations Security Council met on Monday to discuss the...

Rethinking IT Infrastructure in the AI era

The IT infrastructure landscape is undergoing significant changes in the AI era. Adopting AI...

TechGraph Introduces New Rates for Press Releases and SEO Articles

TechGraph has announced a new pricing structure for businesses looking to publish press releases...

Leveraging AI in Press Release Distribution: The Future of PR

Over the years the field of Public Relations (PR) has undergone significant transformation with...

Identifying the Key Loopholes in the Current Digital Wallets

Digital wallets have evolved to meet the demands of decentralized solutions built with blockchain...

A Connected GRC Approach is a Strategic Imperative for Modern Businesses

The approach to implementing GRC is rapidly evolving globally. The reason? Adapting to today’s...

Customer Sentiment Analysis in Retail Banking: Leveraging Speech Analytics for Deeper Insights

Jeff Bezos, the Founder of Amazon, famously stated, “It is not the customer’s job...

Vehant Technologies’ Shailendra Kumar Singh On Leveraging AI To Tackle India’s Traffic Challenges

During an interview with our editorial team, Shailendra Kumar Singh, Business Unit Head ,...

United Nations Security Council Holds Meeting On Israel Middle East Situation

UN LIVE: Members of the United Nations Security Council meet to discuss the Israel...

TVS Motor Achieves Highest Ever Revenue and Profits in Q2

TVS Motor Company posts highest ever operating revenue of Rs. 9,228 Crores registering a...
00:00:00

Live From Parliament: UK Deputy PM Angela Rayner takes PMQs

London News: The United Kingdom (UK) deputy prime minister Angela Rayner takes questions from...
00:03:45

US President Biden Apologies To Native Indians For Horrific Boarding School Policy

During a visit to the Gila River Indian Community in Arizona, President Joe Biden...

Identifying the Key Loopholes in the Current Digital Wallets

Digital wallets have evolved to meet the demands of decentralized solutions built with blockchain...

Serhii Tokarev’s Strategies for Improving Math Education in Ukraine

Mathematics is essential in many areas of life, from technology and space exploration to...

A Connected GRC Approach is a Strategic Imperative for Modern Businesses

The approach to implementing GRC is rapidly evolving globally. The reason? Adapting to today’s...