There are six new trends sweeping across the IT landscape taxing traditional identity architectures and carrying enough power to make or break enterprise business strategy.
I outlined these six IT trends in a Webinar presentation last month that was accompanied by a white paper, Beyond the Firewall: The Top Six Trends Driving IT Executives to Rethink the Security Perimeter.
I encourage you to listen and to read, but here I'll cut to the chase: securing identities is critical for the successful adoption of these trends. These trends are overwhelming the firewall and transforming identity into the new security perimeter.
Today, we start a six-part series entitled "Beyond the Firewall" where we will dissect these trends over the coming weeks and look at how they are forcing IT to rethink identity and access management and retool architectures.
Each part of the series will examine the benefits and challenges (based on traditional security systems) of these distinct trends:
Cloud-based Apps / SaaS: Benefits include speed and agility, along with the ability to quickly respond to business demands. Challenges include multiple passwords and account management woes.
Application Programming Interfaces (APIs): Benefits include streamlined information sharing and data access for mobile applications. Challenges include access control, data leakage and complexity.
BYOD and the Internet of Things (IoT): Benefits include increased productivity, improved market response and personalization. Challenges center on multiple passwords (often stored on the device), risk of stolen credentials, decay of identity and access control when large numbers of device/thing identities are introduced into legacy IAM systems.
The Omnichannel: Benefits include enhanced customer experience often leading to increased revenues. Challenges include fluid transfer of a single identity across channels and access control points.
Expanding Customer and Partner Access: Benefits include enhanced sharing of applications and information often leading to increased revenues. Challenges are password proliferation, 'zombie' accounts, and added cost of managing separate customer and partner directories and identities.
Hackers, Bugs, Spies and Big Data: Benefits of Big Data include personalization and business intelligence. The challenges are password proliferation, access control and--most important--reputation damage and liability in the aftermath of a breach.
Traditional identity and access management systems (CA, Oracle, IBM) don't work because they are focused on proprietary technology and behind-the-firewall internal security. Additionally, these systems are complex, expensive and often force vendor lock-in.
So what are the solutions to each of these challenges and what unlocks the potential of each trend?
This new model of IAM provides the solutions needed by extending security beyond the firewall. The new model provides federated identity and single sign-on to eliminate password proliferation, simple access control and the ability to deploy in the cloud, to implement as an on-premises solution or both.
Additionally, it's built on industry standards such as SAML, SCIM, OAuth 2.0 and OpenID Connect. And this new IAM model holds the potential for off-the-charts return on investment (ROI) as detailed in this Forrester Research white paper commissioned by Ping Identity: Total Economic Impact Of The Identity And Access Management Platform From Ping Identity.
Each week for the next six weeks my colleague Matt Klassen will explore in detail each of these six trends.
In the meantime, we'd like to have a discussion between each installment.
What's been your experience in utilizing each of the trends with your current security system and how have they impacted your business? If you have implemented new IAM architectures, what benefits have you seen as it pertains to new IT trends? Add your comments below.
Next up: The security challenges posed by Cloud-based applications and SaaS as employees traverse the firewall, password proliferation risks and complications, and rogue app usage.
For more on specific "Beyond the Firewall" topics, check out: