As Gartner IAM Summit Spotlights Identities, New Survey Sizes The Challenge

Gartner IAM Summit

The Gartner IAM Summit in London last week put the spotlight on digital identities and how best to morph standards and infrastructures to support both people and things, commonly referred to as the Internet of Everything (IoE).   Whether the answer is a more people-centric security approach as advocated by one Gartner researcher, or any of 5 different platform approaches, as advocated by another Gartner analyst – security experts agree the Internet of Things (IoT) is an identity management challenge that must be addressed.

Security Concerns

security-concerns

We thought it would be helpful to size the level of concern among IT executives.  Turns out they’re tremendously concerned.   An independent survey commissioned by GlobalSign that was released immediately prior to the event shows that some 90% of senior IT leaders at organizations with over 1000 employees, surveyed in the US and the UK said they were either somewhat concerned, very concerned, or extremely concerned about their organizations’ identity relationship and access management (IRAM) capabilities.   The Bring Your Own Device (BYOD) trend, the fact more employees working from home, smart electronics and wearables allow more physical devices to act as conduits to corporate networks – further expands the potential security risk.

The US appeared to show greater concern, with 66% of the IT executives surveyed ranking identity and network access as a matter over which they are either extremely or strongly concerned – with 21% of them rating their concern as extreme.   In contrast only 23% of UK respondents — nearly one-third of the US level — stated they were strongly or extremely concerned, with only 3% in the UK saying they were extremely concerned.  The survey was performed by technology market research firm Vanson Bourne in late January 2015.

Not surprisingly, results across four key vertical sectors showed that nearly twice the number of IT executives at financial services firms were extremely concerned than their peer respondents in the manufacturing, retail or other sectors.  Results were consistent across company size – the survey assessed companies with between 1000 and 3000 employees, and those with over 3000 employees.

The Internet of Everything Era

 

More importantly, the concern about identities in the IoE era is being reflected in IT budgets. The just released TechTarget/Computerweekly IT Spending Priorities study ranked IAM as the #1 spending priority of UK and European firms this year, with 36% of UK IT managers and 33% in Europe planning IAM initiatives. GlobalSign’s Finland-based IAM team found that some 40% of the top 500 companies in Finland plan to improve IT infrastructure and e-Services with identity and access management within 12 months.

Mobile standards such as Oauth as well as existing solutions such as the use of enterprise PKI services were also part of the Gartner IAM discussion.   The event spotlighted newer delivery models such as “Security as-a-Service” offerings and other innovations that streamline IAM deployments from the typical six months down to just weeks – so that the lengthy build-out cycles associated with these solutions do not act as an impediment to their more widespread adoption.

While the Gartner IAM Summit addressed new technologies, case studies and recommendations for success, it acknowledged there is still work to be done on the identities front.  But we remain optimistic about the IoE for good reason: new research from Verizon suggests that by 2025 the firms that embrace the IoE will become 10% more profitable.   Now there’s a data point around which just about every firm can find agreement.

By Petteri Ihalainen

Bitcoin electricity
Bitcoin Heating? Bitcoin mining or cryptocurrency mining has been widely vilified for it’s environmental impact. Why it does draw a huge amount of energy, more and more of it is coming from renewable sources and ...
Rajesh Khanna
Implement Hyperautomation to Scale Automation Programs by 3X Most Digital Service Providers (DSPs) struggle to accelerate their path to Hyperautomation due to the complex processes with legacy systems and applications. Although Robotic Process Automation (RPA) plays a ...
Alex Vakulov
Ransomware Database Targeting The scourge of ransomware is undoubtedly the most severe cyber security concern for home users and organizations these days. It revolves around taking important data hostage and demanding money, usually hard-to-trace cryptocurrency ...
Yuliya Melnik
Heroku or AWS Cloud infrastructures are gradually starting to penetrate into an increasing number of areas and various businesses. And this is not surprising because such a ploy allows you to improve internal processes, protect ...
Alex Dean
Enabling Privacy and Personalization Most businesses today rely on data collected online to better understand their customers and deliver more personalized products, services and experiences. These insights can be transformative for an organization, especially when ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.