SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Strategic Business and Growth Advisory Firm
www.Quadrant-Solutions.com
IDoT is Transforming Identity and Access
Management (IAM) Solutions
Advent of internet of things (IoT) technologies driven by initiatives such as Industry 4.0 and
Smart Manufacturing are leading to significant transformation in the way people, process,
and technologies are converging and driving improvements. Widespread adoption of IoT
technologies are leading to the fourth industrial revolution for a better and smarter world.
However, the increasing adoption of smart technologies also means increasing concern for
security. According to Quadrant Knowledge Solutions research, securing the internet of
things technologies is expecting to be amongst the largest trend in the next four to five
years. Quadrant’s Security Technologies research covers the detailed market analysis for
various security technologies and detailed technology trends.
Driven by increased adoption of internet of things technologies, the scope of Identity and
Access Management (IAM) technologies are no longer just confined to people any-more.
With the advent of smart devices and their ability to perform as separate entities, Internet
of Things (IoT) has emerged as a popular trend transforming the IAM technologies. IAM
solutions in its current form cannot handle the complexity of the internet of things.
Identities in IoT are Different than that of Traditional IAM
In IoT, devices act as identifiers and have a unique attribute in a particular domain. This
should not be confused with the address as there is a fundamental difference between an
identifier and an address of a device. For instance, while connecting to the internet, a device
may use an IP (Internet Protocol) address, which can change – if used on a different
network. Hence, addresses are more of communication endpoints. Similarly, a sensor has a
unique attribute, and can interact with humans or other devices directly.
In the absence of a specific identity, the devices may connect with other entities
inadvertently and can put an organization’s data security at risk. Things in IoT are named
depending on their types like physical or logical and things themselves.
It is difficult to implement application development in IoT as devices tend to have different
protocols. Like a sensor of a touch screen has a different protocol than that of a video
monitor.
Traditional IAM systems are focused on people, and therefore, have been unable to
incorporate devices and other identities. IoT requires a completely different classification for
Identities. It includes people, devices, and applications – the entities – which will have same
requirements to interact with each other.
Authentication: A Key Hurdle in IAM for Internet of Things (IoT)
Implementation
Authentication is another big challenge in implementing IoT. Usual IAM measures like Multi-
Factor Authentication (MFA) or even classic authentication like user id/password may not
Strategic Business and Growth Advisory Firm
www.Quadrant-Solutions.com
directly work with it. There are various protocols like MQTT (MQ Telemetry Transport),CoAP
(Constrained Application Protocol), XMPP (Extensible Messaging and Presence Protocol) etc.,
which are used by providers to let entities authenticate themselves. In spite of these
standard authentication options, vendors are finding it difficult to implement them across all
the entities.
According to Quadrant Knowledge Solutions latest market outlook research ―Identity and
Access Management (IAM) Market Outlook – Market Forecast, Trends, and Analysis Through
2020‖, growing adoption of IoT based smart devices are expected to transform the future of
IAM solutions. Traditional people-centric IAM system is transforming to include identities of
different entities including people, services and things within a single IAM framework. Since
IoT comprises of more than one type of entity, defining relationships among the entities is
critical: between a device and a human, a device to an application etc. Identity of Things
(IDoT), which has evolved as an extension of IAM, defines these relationships. IDoT
involves assigning unique identifiers to the IoT devices (things) with an ability to connect
and communicate with other entities (other devices, human, applications and services) over
the internet. IoT is seen as a critical pillar of identity management as the existing data and
planning policies of IAM vendors don’t consider dynamic relationships between entities.
IAM systems are Evolving to Handle Identity of Things (IDoT)
IAM systems were initially not meant to manage devices so IDoT is required to work in the
existing IAM framework and help develop a unified IoT management tool. IDoT — a one
point extension of all things in IAM — will take up many functionalities of systems that have
managed IT and software assets within IAM.
Enterprises and IAM vendors are now moving towards solutions which either have provision
for managing identities or which integrate IAM as a byproduct of connecting IoT assets
together. Due to the key role that IAM has played over the decades to safeguard
enterprise’s data by managing identities, it is expected to play a key role in years to come.
But, the evolution of unified IAM solutions that caters to IoT will determine if it IoT would
continue to remain an extension or whether there would be a migration towards new
solutions.
At this juncture, enterprises are using an existing framework and are adding access control
requirements as an extension their existing access policies. However, this may change as it
doesn’t look sustainable unless IoT vendors come up with custom solutions that can address
an enterprise’s specific needs.
For more information, please visit
 Identity and Access Management Market Research or
 Press Release: Identity and Access Management (IAM) market is driven by BYOD,
Mobility, and Internet of Things or
 Please write to info@Quadrant-Solutions.com
Strategic Business and Growth Advisory Firm
www.Quadrant-Solutions.com
Keywords: Identity and Access Management, IAM, Internet of things, IoT, Identity of
Things, IDoT, Identity Management, Access Management, Market Research
For more info please write to: info@quadrant-solutions.com
About Quadrant Knowledge Solutions
Quadrant Knowledge Solutions is a global advisory and consulting firm focused on helping
clients in achieving business transformation goals with Strategic Business, and Growth
advisory services.
Our Strategic Business, and Growth Advisory services are organized specifically to help
clients develop and validate strategies based on global mega trends, understand the
business potential and untapped opportunities, and strategies for growth.

Contenu connexe

Dernier

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

IDoT is Transforming Identity and Access Management (IAM) Solutions

  • 1. Strategic Business and Growth Advisory Firm www.Quadrant-Solutions.com IDoT is Transforming Identity and Access Management (IAM) Solutions Advent of internet of things (IoT) technologies driven by initiatives such as Industry 4.0 and Smart Manufacturing are leading to significant transformation in the way people, process, and technologies are converging and driving improvements. Widespread adoption of IoT technologies are leading to the fourth industrial revolution for a better and smarter world. However, the increasing adoption of smart technologies also means increasing concern for security. According to Quadrant Knowledge Solutions research, securing the internet of things technologies is expecting to be amongst the largest trend in the next four to five years. Quadrant’s Security Technologies research covers the detailed market analysis for various security technologies and detailed technology trends. Driven by increased adoption of internet of things technologies, the scope of Identity and Access Management (IAM) technologies are no longer just confined to people any-more. With the advent of smart devices and their ability to perform as separate entities, Internet of Things (IoT) has emerged as a popular trend transforming the IAM technologies. IAM solutions in its current form cannot handle the complexity of the internet of things. Identities in IoT are Different than that of Traditional IAM In IoT, devices act as identifiers and have a unique attribute in a particular domain. This should not be confused with the address as there is a fundamental difference between an identifier and an address of a device. For instance, while connecting to the internet, a device may use an IP (Internet Protocol) address, which can change – if used on a different network. Hence, addresses are more of communication endpoints. Similarly, a sensor has a unique attribute, and can interact with humans or other devices directly. In the absence of a specific identity, the devices may connect with other entities inadvertently and can put an organization’s data security at risk. Things in IoT are named depending on their types like physical or logical and things themselves. It is difficult to implement application development in IoT as devices tend to have different protocols. Like a sensor of a touch screen has a different protocol than that of a video monitor. Traditional IAM systems are focused on people, and therefore, have been unable to incorporate devices and other identities. IoT requires a completely different classification for Identities. It includes people, devices, and applications – the entities – which will have same requirements to interact with each other. Authentication: A Key Hurdle in IAM for Internet of Things (IoT) Implementation Authentication is another big challenge in implementing IoT. Usual IAM measures like Multi- Factor Authentication (MFA) or even classic authentication like user id/password may not
  • 2. Strategic Business and Growth Advisory Firm www.Quadrant-Solutions.com directly work with it. There are various protocols like MQTT (MQ Telemetry Transport),CoAP (Constrained Application Protocol), XMPP (Extensible Messaging and Presence Protocol) etc., which are used by providers to let entities authenticate themselves. In spite of these standard authentication options, vendors are finding it difficult to implement them across all the entities. According to Quadrant Knowledge Solutions latest market outlook research ―Identity and Access Management (IAM) Market Outlook – Market Forecast, Trends, and Analysis Through 2020‖, growing adoption of IoT based smart devices are expected to transform the future of IAM solutions. Traditional people-centric IAM system is transforming to include identities of different entities including people, services and things within a single IAM framework. Since IoT comprises of more than one type of entity, defining relationships among the entities is critical: between a device and a human, a device to an application etc. Identity of Things (IDoT), which has evolved as an extension of IAM, defines these relationships. IDoT involves assigning unique identifiers to the IoT devices (things) with an ability to connect and communicate with other entities (other devices, human, applications and services) over the internet. IoT is seen as a critical pillar of identity management as the existing data and planning policies of IAM vendors don’t consider dynamic relationships between entities. IAM systems are Evolving to Handle Identity of Things (IDoT) IAM systems were initially not meant to manage devices so IDoT is required to work in the existing IAM framework and help develop a unified IoT management tool. IDoT — a one point extension of all things in IAM — will take up many functionalities of systems that have managed IT and software assets within IAM. Enterprises and IAM vendors are now moving towards solutions which either have provision for managing identities or which integrate IAM as a byproduct of connecting IoT assets together. Due to the key role that IAM has played over the decades to safeguard enterprise’s data by managing identities, it is expected to play a key role in years to come. But, the evolution of unified IAM solutions that caters to IoT will determine if it IoT would continue to remain an extension or whether there would be a migration towards new solutions. At this juncture, enterprises are using an existing framework and are adding access control requirements as an extension their existing access policies. However, this may change as it doesn’t look sustainable unless IoT vendors come up with custom solutions that can address an enterprise’s specific needs. For more information, please visit  Identity and Access Management Market Research or  Press Release: Identity and Access Management (IAM) market is driven by BYOD, Mobility, and Internet of Things or  Please write to info@Quadrant-Solutions.com
  • 3. Strategic Business and Growth Advisory Firm www.Quadrant-Solutions.com Keywords: Identity and Access Management, IAM, Internet of things, IoT, Identity of Things, IDoT, Identity Management, Access Management, Market Research For more info please write to: info@quadrant-solutions.com About Quadrant Knowledge Solutions Quadrant Knowledge Solutions is a global advisory and consulting firm focused on helping clients in achieving business transformation goals with Strategic Business, and Growth advisory services. Our Strategic Business, and Growth Advisory services are organized specifically to help clients develop and validate strategies based on global mega trends, understand the business potential and untapped opportunities, and strategies for growth.