SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
Strategic Business and Growth Advisory Firm
www.Quadrant-Solutions.com
IDoT is Transforming Identity and Access
Management (IAM) Solutions
Advent of internet of things (IoT) technologies driven by initiatives such as Industry 4.0 and
Smart Manufacturing are leading to significant transformation in the way people, process,
and technologies are converging and driving improvements. Widespread adoption of IoT
technologies are leading to the fourth industrial revolution for a better and smarter world.
However, the increasing adoption of smart technologies also means increasing concern for
security. According to Quadrant Knowledge Solutions research, securing the internet of
things technologies is expecting to be amongst the largest trend in the next four to five
years. Quadrant’s Security Technologies research covers the detailed market analysis for
various security technologies and detailed technology trends.
Driven by increased adoption of internet of things technologies, the scope of Identity and
Access Management (IAM) technologies are no longer just confined to people any-more.
With the advent of smart devices and their ability to perform as separate entities, Internet
of Things (IoT) has emerged as a popular trend transforming the IAM technologies. IAM
solutions in its current form cannot handle the complexity of the internet of things.
Identities in IoT are Different than that of Traditional IAM
In IoT, devices act as identifiers and have a unique attribute in a particular domain. This
should not be confused with the address as there is a fundamental difference between an
identifier and an address of a device. For instance, while connecting to the internet, a device
may use an IP (Internet Protocol) address, which can change – if used on a different
network. Hence, addresses are more of communication endpoints. Similarly, a sensor has a
unique attribute, and can interact with humans or other devices directly.
In the absence of a specific identity, the devices may connect with other entities
inadvertently and can put an organization’s data security at risk. Things in IoT are named
depending on their types like physical or logical and things themselves.
It is difficult to implement application development in IoT as devices tend to have different
protocols. Like a sensor of a touch screen has a different protocol than that of a video
monitor.
Traditional IAM systems are focused on people, and therefore, have been unable to
incorporate devices and other identities. IoT requires a completely different classification for
Identities. It includes people, devices, and applications – the entities – which will have same
requirements to interact with each other.
Authentication: A Key Hurdle in IAM for Internet of Things (IoT)
Implementation
Authentication is another big challenge in implementing IoT. Usual IAM measures like Multi-
Factor Authentication (MFA) or even classic authentication like user id/password may not
Strategic Business and Growth Advisory Firm
www.Quadrant-Solutions.com
directly work with it. There are various protocols like MQTT (MQ Telemetry Transport),CoAP
(Constrained Application Protocol), XMPP (Extensible Messaging and Presence Protocol) etc.,
which are used by providers to let entities authenticate themselves. In spite of these
standard authentication options, vendors are finding it difficult to implement them across all
the entities.
According to Quadrant Knowledge Solutions latest market outlook research ―Identity and
Access Management (IAM) Market Outlook – Market Forecast, Trends, and Analysis Through
2020‖, growing adoption of IoT based smart devices are expected to transform the future of
IAM solutions. Traditional people-centric IAM system is transforming to include identities of
different entities including people, services and things within a single IAM framework. Since
IoT comprises of more than one type of entity, defining relationships among the entities is
critical: between a device and a human, a device to an application etc. Identity of Things
(IDoT), which has evolved as an extension of IAM, defines these relationships. IDoT
involves assigning unique identifiers to the IoT devices (things) with an ability to connect
and communicate with other entities (other devices, human, applications and services) over
the internet. IoT is seen as a critical pillar of identity management as the existing data and
planning policies of IAM vendors don’t consider dynamic relationships between entities.
IAM systems are Evolving to Handle Identity of Things (IDoT)
IAM systems were initially not meant to manage devices so IDoT is required to work in the
existing IAM framework and help develop a unified IoT management tool. IDoT — a one
point extension of all things in IAM — will take up many functionalities of systems that have
managed IT and software assets within IAM.
Enterprises and IAM vendors are now moving towards solutions which either have provision
for managing identities or which integrate IAM as a byproduct of connecting IoT assets
together. Due to the key role that IAM has played over the decades to safeguard
enterprise’s data by managing identities, it is expected to play a key role in years to come.
But, the evolution of unified IAM solutions that caters to IoT will determine if it IoT would
continue to remain an extension or whether there would be a migration towards new
solutions.
At this juncture, enterprises are using an existing framework and are adding access control
requirements as an extension their existing access policies. However, this may change as it
doesn’t look sustainable unless IoT vendors come up with custom solutions that can address
an enterprise’s specific needs.
For more information, please visit
 Identity and Access Management Market Research or
 Press Release: Identity and Access Management (IAM) market is driven by BYOD,
Mobility, and Internet of Things or
 Please write to info@Quadrant-Solutions.com
Strategic Business and Growth Advisory Firm
www.Quadrant-Solutions.com
Keywords: Identity and Access Management, IAM, Internet of things, IoT, Identity of
Things, IDoT, Identity Management, Access Management, Market Research
For more info please write to: info@quadrant-solutions.com
About Quadrant Knowledge Solutions
Quadrant Knowledge Solutions is a global advisory and consulting firm focused on helping
clients in achieving business transformation goals with Strategic Business, and Growth
advisory services.
Our Strategic Business, and Growth Advisory services are organized specifically to help
clients develop and validate strategies based on global mega trends, understand the
business potential and untapped opportunities, and strategies for growth.

Más contenido relacionado

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Destacado

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destacado (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

IDoT is Transforming Identity and Access Management (IAM) Solutions

  • 1. Strategic Business and Growth Advisory Firm www.Quadrant-Solutions.com IDoT is Transforming Identity and Access Management (IAM) Solutions Advent of internet of things (IoT) technologies driven by initiatives such as Industry 4.0 and Smart Manufacturing are leading to significant transformation in the way people, process, and technologies are converging and driving improvements. Widespread adoption of IoT technologies are leading to the fourth industrial revolution for a better and smarter world. However, the increasing adoption of smart technologies also means increasing concern for security. According to Quadrant Knowledge Solutions research, securing the internet of things technologies is expecting to be amongst the largest trend in the next four to five years. Quadrant’s Security Technologies research covers the detailed market analysis for various security technologies and detailed technology trends. Driven by increased adoption of internet of things technologies, the scope of Identity and Access Management (IAM) technologies are no longer just confined to people any-more. With the advent of smart devices and their ability to perform as separate entities, Internet of Things (IoT) has emerged as a popular trend transforming the IAM technologies. IAM solutions in its current form cannot handle the complexity of the internet of things. Identities in IoT are Different than that of Traditional IAM In IoT, devices act as identifiers and have a unique attribute in a particular domain. This should not be confused with the address as there is a fundamental difference between an identifier and an address of a device. For instance, while connecting to the internet, a device may use an IP (Internet Protocol) address, which can change – if used on a different network. Hence, addresses are more of communication endpoints. Similarly, a sensor has a unique attribute, and can interact with humans or other devices directly. In the absence of a specific identity, the devices may connect with other entities inadvertently and can put an organization’s data security at risk. Things in IoT are named depending on their types like physical or logical and things themselves. It is difficult to implement application development in IoT as devices tend to have different protocols. Like a sensor of a touch screen has a different protocol than that of a video monitor. Traditional IAM systems are focused on people, and therefore, have been unable to incorporate devices and other identities. IoT requires a completely different classification for Identities. It includes people, devices, and applications – the entities – which will have same requirements to interact with each other. Authentication: A Key Hurdle in IAM for Internet of Things (IoT) Implementation Authentication is another big challenge in implementing IoT. Usual IAM measures like Multi- Factor Authentication (MFA) or even classic authentication like user id/password may not
  • 2. Strategic Business and Growth Advisory Firm www.Quadrant-Solutions.com directly work with it. There are various protocols like MQTT (MQ Telemetry Transport),CoAP (Constrained Application Protocol), XMPP (Extensible Messaging and Presence Protocol) etc., which are used by providers to let entities authenticate themselves. In spite of these standard authentication options, vendors are finding it difficult to implement them across all the entities. According to Quadrant Knowledge Solutions latest market outlook research ―Identity and Access Management (IAM) Market Outlook – Market Forecast, Trends, and Analysis Through 2020‖, growing adoption of IoT based smart devices are expected to transform the future of IAM solutions. Traditional people-centric IAM system is transforming to include identities of different entities including people, services and things within a single IAM framework. Since IoT comprises of more than one type of entity, defining relationships among the entities is critical: between a device and a human, a device to an application etc. Identity of Things (IDoT), which has evolved as an extension of IAM, defines these relationships. IDoT involves assigning unique identifiers to the IoT devices (things) with an ability to connect and communicate with other entities (other devices, human, applications and services) over the internet. IoT is seen as a critical pillar of identity management as the existing data and planning policies of IAM vendors don’t consider dynamic relationships between entities. IAM systems are Evolving to Handle Identity of Things (IDoT) IAM systems were initially not meant to manage devices so IDoT is required to work in the existing IAM framework and help develop a unified IoT management tool. IDoT — a one point extension of all things in IAM — will take up many functionalities of systems that have managed IT and software assets within IAM. Enterprises and IAM vendors are now moving towards solutions which either have provision for managing identities or which integrate IAM as a byproduct of connecting IoT assets together. Due to the key role that IAM has played over the decades to safeguard enterprise’s data by managing identities, it is expected to play a key role in years to come. But, the evolution of unified IAM solutions that caters to IoT will determine if it IoT would continue to remain an extension or whether there would be a migration towards new solutions. At this juncture, enterprises are using an existing framework and are adding access control requirements as an extension their existing access policies. However, this may change as it doesn’t look sustainable unless IoT vendors come up with custom solutions that can address an enterprise’s specific needs. For more information, please visit  Identity and Access Management Market Research or  Press Release: Identity and Access Management (IAM) market is driven by BYOD, Mobility, and Internet of Things or  Please write to info@Quadrant-Solutions.com
  • 3. Strategic Business and Growth Advisory Firm www.Quadrant-Solutions.com Keywords: Identity and Access Management, IAM, Internet of things, IoT, Identity of Things, IDoT, Identity Management, Access Management, Market Research For more info please write to: info@quadrant-solutions.com About Quadrant Knowledge Solutions Quadrant Knowledge Solutions is a global advisory and consulting firm focused on helping clients in achieving business transformation goals with Strategic Business, and Growth advisory services. Our Strategic Business, and Growth Advisory services are organized specifically to help clients develop and validate strategies based on global mega trends, understand the business potential and untapped opportunities, and strategies for growth.