The most important question every CISO or CIO concerns about optimization and efficiency around process with minimal security incident (to make a close to zero). This often leads to comparison with peers on "How are we doing as an organization?”, “What is the next step for us as we build our secure environment using IAM infrastructure?” and “How to develop IAM maturity model?

  1. Security is still the top driver behind the use of Identity and Access Management Tools
  2. IT administration efficiency is now the second most common motivator, with 30% of respondents from a recent Forrester survey weighting this efficiency above regulatory compliance.
  3. Business agility is also a new factor, as business owners increasingly look to security professionals to solve business problems.


( Read more:  BYOD Security: From Defining the Requirements to Choosing a Vendor )

With the increasing sophistication of fraud rings and security attacks, coupled with the rapid adoption of various mobile and post-PC devices and the changing business environment, it will be important to consider various questions when selecting your organization's next IAM product.For example

  1. Does the product recognize risk and patterns, making fraudulent activity easily identifiable? Or, more simply, does the product work from a mobile device? While mobile browser support is a minimum requirement, mechanisms for secure PKI certificate management and centralized access auditing should also be expected.
  2. Does the product support geographic patterns and provide detection and prevention defense mechanism.
  3. Most importantly, does the product help improve business agility and demonstrate value? By proving to budget holders that substantial savings are achievable, it will be much easier to sell the product internally.
  4. Future product Strategies
  5. User Friendliness and Integration support for 3rd party COTS based solution and homegrown application
  6. Integration with Service oriented environment.

( Read more:  Hardware Trojans: Sneak Peek into the Future )

To understand the facts lets analyze the Identity and access management predictions- 

  • Prediction 1: Business agility will continue to rise in importance
  • Prediction 2: Data security will come to depend on IAM
  • Prediction 3: Mobile devices will need to be managed via IAM systems
  • Prediction 4: IAM in the cloud will provide more than just access control

What are your thoughts on IAM Trends? Share your thoughts on the comments space below.

 

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)