View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Networks
December 16, 2014

Internet of Things to fuel new IAM deployments

Biometric systems to replace passwords and fingerprints across 80% of the market by 2020.

By CBR Staff Writer

A report from Gartner suggests that the Internet of Things (IoT) will fuel the device and user relationship necessities in 20% of identity and access management (IAM) deployments by late 2016.

The ‘Gartner’s Predicts 2015: Identity and Access Management’ report noted that the enterprise mobility management (EMM) integration will turn out to be a vital IAM requirement for 40% of consumers.

Gartner research vice president Earl Perkins said: "IAM, as defined today, will bifurcate, with identity management assuming a broader entity relationship management role and access management assuming a broader relationship execution role that replaces or supplements authentication policy and authorization enforcement."

"Traditional authentication and authorization for user identities will continue to include devices and services, but will also incorporate expanded machine-to-machine (M2M) communications requirements into expanding digital business moments."

"Embedded software and systems will make extensive use of the new and expanded IAM architecture to handle the scale and ubiquity requirements the IoT will demand."

The research firm also projects that 60% of businesses will use active social identity proofing, enabling users to bring in social identities to access risk-appropriate applications by 2020.

Gartner principal research analyst Anmol Singh said: "More enterprises could adopt a bring your own identity (BYOI) approach for allowing customers and workforces to use their social identities, thereby improving user experience and opportunity to leverage social relationships for marketing purposes."

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

"With low-cost, social identity-proofing services, small and midsize businesses could use remote on-demand verification of identities to grant access to users outside the organization, eliminating the need to manage detailed identity-proofing processes in-house."

Gartner also forecasts that new biometric systems will replace passwords and fingerprints as access to endpoint devices across 80% of the market by 2020.

The user interest in fingerprint technologies is expected to grow at around 20% of the overall endpoint device market in 2017, the report added.

Gartner research vice president Ant Allan said: "Embedded fingerprint authentication does not improve user experience for everyone.

"Furthermore, given the low trust that these methods afford, we expect to see increasing dissatisfaction as people’s devices are compromised over the next few years.

"The same kind of biometric modes that organisations may soon adopt for authentication from the device will be preferred for authentication to the device in the midterm."

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU