CA Technologies predicts that cloud, mobile and social media will continue to impact Identity and Access Management professional in 2014. The company released five trends it sees emerging in the new year.
Hardware elements in mobile devices will become an increasingly important part of IAM. Users will continue to adopt new mobile devices in a 12 to 24 month cycle, making advanced hardware security technologies, such as ARM TrustZone, available. Device manufacturers will build security systems, such as Samsung Knox, on top of these technologies. These systems will help solve the Bring Your Own Device challenges enterprises face by providing secure ways to separate corporate and personal data and applications. In addition to securing the devices themselves, consumers will be able to use them for identification to other systems and perform advanced functions like secure payments. The phone will finally begin to establish itself as the primary and secure way of authenticating users and proving identity.
Lack of scalable identity proofing will continue to vex broader business to consumer and government to consumer deployments. The recent online user experiences as part of the Obamacare rollout demonstrated the logistical challenges of validating online identities in an accurate and scalable manner. As more and more users enroll in online services, demand for identity proofing services will increase significantly but organizations will continue to experience identity-proofing challenges. While the sources for identity proofing data will continue to expand with the digitization and exposure of new public and private records, this continued demand for identity proofing in 2014 will force the industry to collaborate and partner more closely to deliver scalable identity proofing to meet these needs.
The chief marketing officer will become a new force for broad identity management initiatives. Successful marketing depends on understanding customers’ needs and providing them with a convenient experience for registration and enrollment. Enabling social login and maintaining a corporate presence on social networks provides an opportunity to capture customer data, including user identities, social interaction patterns, and browsing and buying tendencies. The CMO will press for these capabilities to help the enterprise engage with its customers, develop a stronger relationship with them and improve loyalty. Identity management infrastructures that support these marketing initiatives will experience improved demand as a result.
Risk-based authentication expands beyond financial services. The enterprise wants to enable consumers and employees to use mobile devices for access but existing security procedures remain problematic. Security mechanisms that are cumbersome for consumers accustomed to instant access are met with resistance or all-out avoidance. The need for stronger authentication and a positive user experience will lead to the widespread adoption of risk-based authentication, where contextual data about users, devices, applications, locations and other potential risk factors are collected and analyzed to determine a risk-level for the user’s identity. Financial services companies have been a leader in the adoption of risk-based authentication due to the high value of many customer transactions. But, this technology will begin to be more widely adopted across other industries as the need for improved security without impacting user convenience increases.