Publication: ProSecurity, 10 Jan 2014

"We believe that the technology trends of cloud, mobile and social will continue to heavily influence the direction and need for IAM in 2014, but we also see new business demands and enabling technologies joining in to put a twist on the IAM and security path for many organizations," said Mike Denning, senior vice president and general manager, Security business, CA Technologies.

Identity and Access Management in 2014 - a prediction of what's ahead:

* The software-defined, open enterprise emerges: The enterprise is remaking itself into a platform that developers can experiment with and innovate on. Every IT layer from data to application to infrastructure to network is becoming service-enabled and software-defined through APIs. The pattern extends beyond the data center to partners and cloud services as enterprises are forced to open up. A new wave of innovation will be ushered in as developers both inside and outside the enterprise gain access to the core building blocks that define an organization. This will speed experimentation and innovation as they construct new mashups leveraging the full range of software defined assets. Traditional IT departments will need to evolve to protect and secure access to these new assets as building blocks for agile development.

* Hardware elements in mobile devices will become an increasingly important part of IAM: Users will continue to adopt new mobile devices on a short (12-24 month) cycle, rapidly making advanced hardware security technologies, such as ARM TrustZone, widely available. Device manufacturers will build security systems, such as Samsung Knox, on top of these technologies. These systems will help solve the BYOD challenges enterprises face by providing secure ways to separate corporate and personal data and applications. In addition to securing the devices themselves, users will be able to use them to identify themselves to other systems and to perform advanced functions like secure payments. The phone will finally begin to establish itself as the primary and secure way of authenticating users and proving identity.

distributed by