Growth in the mobile IAM market
The global mobile identity management market is predicted to grow at a compound annual growth rate of 9.45% between 2016-2020, according to Research and Markets.
To calculate the market size, the report considers paid mobile identity applications for mobile application management and mobile device management. The report also includes a discussion of the key vendors operating in this market.
Rising adoption of multi-factor authentication will be a key trend for market growth. According to the report, one of the key drivers for market growth will be privacy concerns of mobile users. The mobile threat landscape continues to grow because of the growing Internet speed, cloud services, and a number of apps available on mobile devices for every age group.
With more people using their smartphones for managing finances, online shopping, paying bills, and playing online games, the threat is expected to be always on the phone. Some of the mobile threats are malware, risky apps, device vulnerabilities, jailbroken and rooted devices, and rogue Wi-Fi access points.
Further, the report states that difficulty in formulating common regulatory framework will be a challenge for the market. The legal and regulatory frameworks for mobile identity management are particularly related to issues of authentication and identification. So, policymakers and regulators need to ensure adequate privacy safeguards and maintain a flexible approach that will encourage new applications and also allow consumers to make their decisions based on their digital identity.
Security of Things conference announces keynotes
The Smart Card Alliance Security of Things 2016 is coming to Chicago to bring the topics of security, privacy and authentication to the forefront of the Internet of Things (IoT).
Speakers from both the IoT and security communities will discuss the impact embedded security technology is expected to have on connected cars, wearables, smart homes, identity and authentication, data integrity and privacy, IoT payment, standards and regulation and more.
The two-day conference will feature more than 40 speakers, with keynotes, panels and track sessions on the most important topics across different IoT markets. Experts leading the first-day keynotes will kick off the event with a big picture look at IoT security, including:
- The Security of Things: A Perspective on Securing the IoT Ecosystem— Sami Nassar, vice president and general manager, NXP Semiconductors
- IoT Security Architectures and Frameworks— Eric Uner, chief technology officer and chief scientist, Redwall Technologies
- A discussion with Nathaniel Gleicher, head of cybersecurity strategy, Illumio, on IoT security in the Connected World
Attendees can build their own experience from other sessions scheduled throughout the conference by choosing between more than 20 sessions across the concurrent Secure IoT Technology and Secure IoT Applications tracks. Session tracks will give attendees a deep dive into the most pressing issues impacting the industry, including the role of smart card technology in IoT, the security of connected cars, the intersection of IoT and payments, healthcare use models in IoT, and other security best practices, challenges and opportunities across the market.
The conference will be held October 18-19, 2016 at the Hilton Rosemont Chicago O’Hare Hotel in Chicago.
AMAG, Technology Industries, Veridt pass GSA testing
AMAG Technology announced its latest Federal Identity, Credential, and Access Management (FICAM)/ FIPS 201 compliant solution approved by the U.S. General Services Administration (GSA). AMAG Technology has partnered with Technology Industries and Veridt to deliver a physical access control system to federal government entities requiring GSA-approved physical access control solutions.
AMAG’s Symmetry physical access control software and Symmetry Intelligent Control panels along with Technology Industries’ EntryPoint Identity Management Suite, and Veridt Stealth Series readers that interface with Veridt EWAC module, passed GSA testing requirements.
To meet specific security requirements mandated by the US government, security manufacturers’ products must be a GSA certified FICAM compliant end-to-end solution. The solution must meet APL testing requirements and integrate with coordinating vendor products to establish compliance with FIPS 201. Symmetry meets all government requirements for access control and intrusion, making it the perfect solution for local, state and federal facilities.