-
Article
Discover identity federation challenges
Federated identity is useful for employees that often work with external company domains because they don't need to create new credentials for each site. But IT should understand the challenges of federated identity, such as agreeing to standards with other companies. Read Now
-
Article
Distinguish between two identity concepts
IAM typically includes identity governance and access management. The two terms are similar, but not interchangeable. Note their differences and understand what each term means to develop a strong IAM strategy. Read Now
-
Article
Tighten password management, overall security
Password management is an essential aspect of identity management that evolved with the proliferation of BYOD. Discover best practices for mobile password management to strengthen an overall IAM strategy. Read Now
-
Article
How to use MFA for mobile apps
An enterprise mobile app should always use multifactor authentication (MFA) to secure corporate data. But MFA can come with significant challenges for the user, so be prepared to navigate these issues. Read Now
Editor's note
In the past, identity management relied on simple username and password authentication methods and involved only a few types of devices. However, as mobile devices become more prevalent in the workforce, IAM must evolve, as well.
BYOD programs, spurred by the popularity of mobile devices, complicate identity and access management (IAM) because they not only add a slew of different devices, but they also bring about security-related concerns as users begin to work remotely. To account for these additional factors, an IAM strategy should include features such as single sign-on (SSO), multifactor authentication (MFA) and biometric authentication.
It's important to distinguish between the two key components of IAM: authorization and authentication. Authentication is who you are; it includes a user's unique credentials, such as DNA -- biometrics -- or knowledge -- passwords. Authorization, on the other hand, denotes what users can do based on their identities. Both of these components are becoming more complex as IAM evolves.
There is an expectation to use features such as SSO or MFA within an IAM strategy, but these components often present challenges from a user's perspective. It's crucial for IT to maintain a balance of strong security and usability in its IAM strategy.
It's important to explore IAM and determine which features are essential to a mobile-driven enterprise. In this guide, we'll review the different types of IAM and authentication methods. And, because it's essential to be aware of the influx of new features and capabilities that will become available, we'll dive into predictions for the future of IAM.
1Explore new identity technology
The IAM market is changing significantly as users' needs evolve. Modern IAM technologies integrate artificial intelligence and biometrics, and an emerging IAM-as-a-service model provides an appealing option for small businesses that don't want to deal with management. Learn about all of these features and more in this section.
-
Article
Experts predict future IAM trends
While companies once attempted to lock down devices to protect data, IAM is now becoming more prevalent. As new IAM tools integrate technologies such as blockchain, adoption rises -- and will likely continue to do so. Read Now
-
Article
New expectations arise for modern IAM
An IAM strategy is now more than just a way to manage passwords and user accounts. IT pros expect capabilities such as advanced metrics and integration with directories -- and IAM technologies aim to meet those needs. Read Now
-
Article
How AI works with identity management
AI and identity management are a perfect match; AI enhances the security of an IAM strategy by determining whether a user's location and behavior are suspicious. Discover the relationship between AI and IAM and how that will continue to evolve. Read Now
-
Article
What cloud can do for IAM
Cloud-based IAM can provide a variety of benefits, especially to businesses that don't want to be involved with day-to-day management. IT should learn the pros and cons of IAM-as-a-service to determine whether it's the best fit. Read Now