Of Transformation Technology Summary Starting October 13 with low code / no code: Enable enterprise efficiency. Sign up now!
Cybercrime has resurfaced in the much-anticipated Identity and Access Management (IMA) industry today. Advances in such devices are driven by the desire of organizations to protect and grow their virtual workforce while maintaining digital transformation initiatives.
Looking at trends affecting the IAM is a step in the right direction, and such a view has been given in a recent Forrest study entitled “Shaping Major Trends in 2021 and Access Management”.
The study, written by forecaster analysts Ryan Ryan and Andras, provides insights into seven key trends in the 2021 IAM market.
Seven key trends in the forester study highlight that now is the time for corporate and CIS supporters to renew their IAM roadmaps. This is because the landscape of identity and access management and related management tools is changing rapidly today. The following is a review of Forrest Seven trends that will determine IAM this year:
Identity and access management is respected
Accelerate the implementation of IAM solutions in the second half of 2020 to improve the sustainability of business and the protection of employees in the interest of many organizations. The epidemic engulfed many organizations that were unprepared for the scale and complexity of cyber-attacks on virtual labor. Cyber security teams have worked tirelessly on several occasions to launch 2FA authentication, with bad actors in the hunt for unique access credentials that could lead to side effects in a bad organization. Forrest predicts IAM growth will accelerate in 2021. According to the company’s research, 61% of security decision-makers plan to increase their IAM budget by 2021, with 32% expected to increase by 5% or more.
No password will become a reality
Forrester predicted that passwordless authentication would work best a year ago, citing the technology as “high trends in IAM by 2020”. Forster sees passwordless authentication going from Hyper to Adoption. Fifty-two percent of security decision makers say their company has already implemented 2FA or password authentication for employees. Approximately 31% of the study was implemented by 2020 or had plans to implement it by 2021. Virtual groups need a password-based approach to secure security, bad internal actors do not abuse special access credentials, and bad foreign actors do not have the opportunity to steal them. Verizon’s 2021 Data Violence Investigation Report finds that violations are a major cause of violations today. Stopping Special Access Abuse begins with designing a password-free authentication system, so that the most discerning users do not get frustrated when using it on any mobile device. The Evanti Zero Introduction (ZSO) approach demonstrates how vendors respond to passwordless authentication and zero trust in the Unified Endpoint Management (UEM) platform. It uses biometrics, including Apple Face ID, as a secondary authentication factor for accessing personal and shared company accounts, information and systems. Additional non-password authentication providers include Microsoft Azure Active Directory (Azure AD), OneLogin Workforce Identity and Thales SafeNet Trusted Access.
IAM programs become more efficient
Strong, ineffective approaches require maintenance for specific identity management, management and user directories, policy or feature-based access control. Older approaches to access controls are leaving many gaps at the player level to exploit bad actors — both corporate and corporate. As a result, Forster’s efficient software development frameworks have become increasingly common in IM development and deployment. This is great news for security and risk professionals who have adopted a more real-time (JIT) approach to streamlining workflows to streamline cloud platforms and software-as-a-service (SaaS) application sessions. Access rights on the fly.
The scale of inhumane identities explodes
For more than a year, Forrest predicted that the number of inhumane identities in many enterprises would more than double the rate of human identity. Forrest describes non-human identities as “helper and helper bots, service accounts, cloud automation and APIs, IoT devices and robots.” Forster has also discovered that software bots are expanding into customer service, finance and IT departments. This comes at a time when robotics are at an all-time high. In addition, Amazon Web Services, Microsoft Circle, Google Cloud Platform and many other public cloud platforms rely heavily on machine tags to perform tasks, contributing to a page increase in non-human identities. Leading vendors that provide IAM for machine IDs include AppViewX, ThyocoticCentrify, HashiCorp, Keyfactor and Venafi, all of which operate in active zero trust frameworks in organizations today.
IAM collection providers will expand
Cloud-based IAM kits are gaining popularity among organizations as they provide a pre-integrated stack that facilitates integration, continuous maintenance and purchase according to Forrest. Cloud-based IAM Forms (IDAAS or managed services) also encourage the creation of IAM collections with mixed support, giving organizations the freedom to turn on new features as needed. In addition, the report mentions recent acquisitions, including the purchase of Cybercar ID, Octa ScaleFT and Auth0, and Ping UnboundID and Symphonic. Forrest believes that purchases are driving further horizontal expansion of IAM.
Network, endpoint and data security
Forrest is looking at how firewalls, web applications firewalls and secure web browsers are lacking in their core policies, especially in the end-to-end network and payload checks. For this reason, they recommend that their customers take a more streamlined and flexible network access approach based on ZTE by connecting network traffic and activity to well-known, verified and authorized users (human and machine IDs). . Leading solutions in this area include ZTEdge platform, which combines MicrosoftFocus, Zero Trust Network Access (ZTNA), Secure Web Gateway (SWG) Remote Browser (RBI), and ML-enabled Identity and Access Management.
Customer identity doubles in analysis
Forster says end-user customers in IT security, marketing, business lines (LOB) and implementation development need customer identification and access management (CIM) systems now to implement access policy and overall user management. Marketing and digital marketing professionals need more accurate, personalized data to streamline marketing campaigns and measure their effectiveness. CIAM forums can provide useful identity analytics and agreement management audit information, all designed to enhance compliance and become a responsive resource for customers. If those goals are achieved, deploying the CIAM platform is a risk and a risk for professionals.
Foster View View IAM trends provide insights and risk experts on how IAM is changing. This rapid change should be seen as part of a broader cyber security strategy. As cloud platforms rely on machine-to-machine integration and adapt to emergencies, administrators need to define their IAM strategy to manage them. Expect IAM budgets to increase for virtual manpower and various threats. These are the tendencies to keep in mind as companies move to launch new digital-first sales and service strategies and other digital transformation efforts.
VentureBeat’s mission is to be a digital city square for technical decision makers to learn about alternative technology and marketing. Our site provides important information on information technologies and strategies to guide you as you lead your organizations. We invite you to become a member of our community:
- Up-to-date information on topics you are looking for
- Our newspapers
- Discounted access to content intended by the Lord and our prestigious events such as ours 2021 transition: know more
- Network features and more