Trends in IAM – A Look-in

Date:

Trending

- Advertisement -

With the new normal after the Covid pandemic, the Digital Security space in general and Identity and Access Management (IDAM) in particular has become a core topic of focus amongst corporates, government organizations, and individuals the world over.  

According to a Gartner study conducted in June 2020, Identity and Access Management spend worldwide this year (2019-20) is going to be 10.4 billion dollars which is a 5.8% increase from last year, whilst the overall security-related spending (covering the areas of Application Security, Data Security, Infrastructure Protection, Risk Management, Cloud Security, Network Security, Security Services combined) world-wide is going to see a growth of only 2.4% from last year.

- Advertisement -

Why there is an increase in IDAM spends this year? 

The primary reason being, increase in access to corporate assets & applications by genuine corporate users, from outside the corporate firewalls.   This could be primarily attributed to the work from home option given to corporate employees, due to the Covid pandemic.   Corporates want to make sure all their IAM systems are protected.

What could be some typical applications that are being accessed?

- Advertisement -

Some examples could be firewalls, ERP, CRM, Java/Dot Net, Legacy, Custom, Home-grown Applications, SaaS Applications, etc.

What is the common question that occurs to everyone, when we think of Identity and Access:

How can a person with the wrong identity should not have the right access or How can a person with a genuine identity (and access) go through such a maze of integrated systems (like Firewall, ERP, CRM, etc. systems) of his/her organization or even across other connected organizations in a secure way and gets his/her tasks accomplished, without a hacker stealing his access rights? 

What could go wrong if these applications accesses are hacked or compromised (either within or across organizations)?  

- Advertisement -

Admin/Root credentials of critical systems falling into the wrong hands, tokens being phished out and used for wrong purposes, user accounts of hackers getting created (as though they are genuine users) in the target applications enabling the hacker to gain access like a regular user, could be some disasters that are waiting to happen.   These hack-ins could cause potentially millions to billions of dollars lost in operating revenue of a major enterprise, if not attended to properly.

So, how does a typically Secure IDAM solution help in mitigating these risks? 

Primarily in two ways.  By establishing trust between these applications/systems and the user.  The second is by way of automating so that any policy that is validating the trust between the applications, is executed automatically resulting in a go or no-go decision regarding the user access to the applications.

How are these 2 objectives achieved by modern IAM systems? 

Primarily the application (say Application A) that needs to grant access will communicate the terms of such access to the application (say Application B) from where the user is requesting access.  Once the terms are agreed upon by both applications, they make sure they communicate the credentials (say a password or a token or a secret key or encrypted payload that contains the user information) automatically between them to make a ‘Go’ or ‘No Go’ decision regarding the access.

Summarizing, we see that enterprises worldwide are focusing on securing their identity-based access mgmt. systems post-Covid, as institutional access to genuine systems, has increased to a great extent, and hence proportionately their IAM spends are also increasing.  

Given this scenario, we see that even though the IDAM systems are maturing, we also see a trend where organizations are increasingly going for Identity support contracts to protect the systems (on a 24×7 basis) even after they have deployed a secure, integrated IDAM solution either in the cloud or on-premise.   This they do to make sure APIs, Connectors, keys, secrets, ports, payloads, user accounts, identity-based token transport are operating at the most secure level.  

But still, there will be a constant need for more innovative solutions to address the risks that are cropping up, as hackers are getting more inventive daily.  But for now, we can say we are systematically covering these risks with the help of modern IDAM solutions.

THE SNAPSHOTS

Sign up to get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.

- Advertisement -
Raj Srinivas
Raj Srinivas
Primarily from a strong security and product engineering background, he has been the principal architect of MISP (Multi-Domain Identity Services Platform) & CIE (Cloud ID Exchange) – in-house IAM & Security products at 8K Miles.

More Latest Stories

More Articles

How SMS Verification Infrastructure Is Evolving in Modern Digital Platforms

As digital platforms scale globally, identity verification has become a critical layer of modern tech infrastructure. From fintech startups to social apps and enterprise...

The Business of Recycling: Profit, Waste, and Sustainability

The business of recycling stands at the intersection of environmental responsibility and economic opportunity. As the world increasingly turns its attention to sustainable practices, recycling has emerged as a pivotal industry, capable of generating profit while mitigating waste. This article delves into how recycling...

Serhii Tokarev Spoke About The Third Season Of The Generation H Accelerator

Serhii Tokarev spoke about the Generation H 3.0 HealthTech accelerator, which is opening applications...

MochaTrade Raises Pre-Seed Funding From Y Combinator and Pioneer Fund

MochaTrade, a global trading platform focused on offering perpetual futures linked to U.S. stocks,...

When AI-Generated Documentation Hurts More Than Helps

AI-generated documentation has quickly become a selling point for modern SaaS and developer platforms,...

How Agentic AI Is Personalising the End to End Salon Experience

Walk into a salon today, and more often than not, the experience still depends...

Apple Reports $111.18 Billion Revenue in Q2 FY26, Net Profit Rises to $29.6 Bn

Apple Inc. (NASDAQ:APPL) has reported its financial results for the quarter ended March 28,...

Hermès vs MetaBirkin: The NFT Case That Redefined Ownership on Ethereum

The NFT boom of 2021 and early 2022 pushed digital assets into the mainstream,...

Borade AI Founder Shiv Kumar Borade on Building an AI Growth Engine for Small Businesses

Speaking with TechGraph, Shiv Kumar Borade, Founder & CMD of Borade.AI, discussed how many growing businesses continue to struggle with disconnected software tools that...

Why Ontarex.com Is Gaining Canadian Investor Attention

In recent months, Ontarex has started to attract noticeable attention from Canadian investors. As...

What India’s developers are building in crypto despite regulatory uncertainty

India’s crypto story has largely been framed through the lens of investment and regulation....

Motilal Oswal Alternates leads $280 Mn Series E Round for KreditBee

India based digital lending platform KreditBee (KrazyBee Services PVT Ltd) has raised $280 million...

Reframing AR for Consumers: Luxid Tech’s Siddhant Agarwal on Building Screen-First Smart Glasses for Everyday Use

Speaking with TechGraph, Siddhant Agarwal, Founder of Luxid Tech, discussed how the AR and...

How Tech-Driven Hiring Models Are Closing India’s Employability Gap

The paradox of employment in India becomes increasingly pronounced every year, as many students graduate from college but struggle to meet the needs of...

Bihar Police, Vehant Technologies Partners to Deploy Screening Systems Across 40 Courts

In a bid to enhance safety and security across court premises for judges, lawyers, and visitors, Vehant Technologies, an India-based security and surveillance solutions provider, announced that it is working with the Bihar Police to deploy advanced screening systems across courts in the state. The...

Rethinking Hospital Security: TrioTree Technologies CEO Surjeet Thakur on Securing Fragmented Hospital IT Environments

In an interaction with TechGraph, Surjeet Thakur, Founder and CEO of TrioTree Technologies, outlined...

Rethinking Growth Metrics: Thrive Global AI’s Priyanka Aeron on Scaling Intelligence for Business Growth

Speaking with TechGraph, Priyanka Aeron, Director and Co-founder of Thrive Global AI, discussed how...

How Home-Based Healthcare is Improving Medical Accessibility Across India

The Indian health care industry has seen considerable transformation in recent times, primarily due...

Meta Platforms, Broadcom Partners to Co-Develop Multi-Gen Silicon AI Chips

Facebook parent Meta Platforms (NASDAQ: META) has expanded its partnership with Broadcom to co-develop...

Practo Names Srijesh Kumar as Global CPTO

India-based online doctor consulting platform, Practo has announced the appointment of Srijesh Kumar as...

Sawai Capital Executes ₹300 Crore Structured Credit Transactions in Q4

A Gurugram-based wealth and investment platform, Sawai Capital, has executed structured credit transactions in...

Cisco Appoints Pete Shimer to Board, Daniel Schulman to Step Down

Cisco Systems (NASDAQ:CSCO) has appointed Pete A. Shimer to its board of directors, while...

Cisco Director Pete Shimer Files Initial Ownership Disclosure with SEC

Cisco Systems (NASDAQ: CSCO) board member Pete A. Shimer has filed an initial statement...

Cisco Report: Cybersecurity Remains Top Challenge as Industrial AI Adoption Expands

Cisco Systems (NASDAQ:CSCO) has released its latest State of Industrial AI Report, highlighting how...

Motilal Oswal Alternates leads $280 Mn Series E Round for KreditBee

India based digital lending platform KreditBee (KrazyBee Services PVT Ltd) has raised $280 million...

“Budget should focus on reducing taxes on capital gains,” Says Abhishek Gupta of Hex N Bit

Speaking in the upcoming Union Budget 2021, Abhishek Gupta, Founder, and CEO, Hex N...

“China is a Global thief” Rep. Tom Rice on Uyghur Forced Labor Prevention Act

Speaking at the House on Uyghur Forced Labor Prevention Act, Rep. Tom Rice (R-SC)...

Refurbished Electronics Platform Grest Secures FDI from Japan’s ICMG in Pre-Series A Round

Grest, an India-based premium refurbished electronics platform, has secured foreign direct investment from ICMG...

The IoT Platform Market Just Consolidated: Smart Integrators Are Looking Elsewhere

Three platforms changed owners in 15 months. Your stack didn't change. Your risk profile did.

Reframing AR for Consumers: Luxid Tech’s Siddhant Agarwal on Building Screen-First Smart Glasses for Everyday Use

Speaking with TechGraph, Siddhant Agarwal, Founder of Luxid Tech, discussed how the AR and...

Alphabet Discloses $2.14 Billion in Public Equity Holdings as of June 30

Alphabet Inc. disclosed $2.14 billion in equity securities held across 39 positions as of...

Gaming for Good: Boosting the Indian Gaming Community through Technology

The Indian gaming industry is transforming remarkably, driven by technological advancement and a growing...

India to generate $100 bn from telephonic investments

India expects to attract $100 billion in investments in the telecom sector, a union...