IAM and AI
Artificial intelligence (AI) is playing an increasingly transformational role in identity and access management, enabling organizations to take a much more granular and adaptive approach to authentication and access management. AI also is essential to user and entity behavior analytics (UEBA) to identify suspicious activity. Indicators like malicious logins, large volumes of login attempts in a short period of time, unknown locations, unrecognized devices and whether or not a user is on the company’s virtual private network (VPN) can signal malicious activity. AI can flag these indicators for investigation in real or near-real time to thwart attempted hacks.
IAM, cloud and IDaaS
IAM from the cloud: Identity as a Service (IDaaS) and managed identity services. A growing number of vendors are offering identity and access management services delivered from the cloud. One approach is known as Identity as a Service (IDaaS), and can be a standalone solution or complementary to existing on-premises IAM systems. With managed identity services, like other managed security services solutions, a security provider will monitor and manage enterprise IAM solutions running either on the cloud or on-premises.
IAM for the cloud. Enterprises today have applications and data on premises, in traditional systems and private clouds, as well as one or more public cloud environments. The challenge is managing user access to resources wherever they are located, as seamlessly as possible. The ideal is an identity and access management system that can support SSO and MFA across hybrid multicloud environments.
IAM and BYOD
In today’s mobile world, where employees want the freedom to work from anywhere using their own mobile phones, tablets, laptops or wearables, organizations are adopting bring your own device (BYOD) programs to make it happen. IAM combined with unified endpoint management platforms can help organizations embrace mobility and adopt BYOD securely.
IAM and IoT
It’s a well-known story. A hacker compromised an aquarium smart thermometer, gained access to the corporate network and stole customer data. The same thing has happened with network-connected CCTV cameras. The object lesson is that virtually any Internet of Things (IoT) device can be hacked, and without access management, the network is wide open to the hackers. Today’s IAM solutions address IoT devices as entities that need to be identified and authorized prior to network access.