The explosive expansion of IT infrastructure has led to the identity and access management market gaining substantial momentum. As the onslaught of information technology continues, organizations are able to offer users quick and easy access to systems and information from any place, at any time. However the ease of access is inherently associated with the risk of security breach.

Organizations have to find a balance between fulfilling user demands and doing so in a manner that is safe enough so that cybercriminals cannot take advantage of the system, thus strengthening identity and access management market trends.

The prominence of IAM solutions in the BFSI sector

In 2016, the world was shocked by the news of the Bangladesh bank heist in which cybercriminals were successful in conducting unauthorized money transfer from Bangladesh Central Bank to banks in Philippines, Sri Lanka and other parts of Asia. In the heist, criminals used Society for Worldwide Interbank Financial Telecommunication (SWIFT) credentials of Bangladesh Bank's employees to carry out more than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank.

More than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank.

More recently in 2018, hackers were able to siphon nearly $20 million from Mexican banks. Analysts point out that targeted bank systems had security holes that made access to internal servers much easier. Also lack of strong access controls was used by hackers to use credentials of compromised employee to gain considerable mileage in the siphoning.

Identity and access management industry has therefore registered a lot of interest through the financial sector and banks as financial institutions need to prove themselves reliable of customers’ trust. Banks and other financial institutions are rapidly adopting identity and access management solutions which are capable of providing strong security starting at authentication level and extending all the way to application and data layers.

IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud with greater ease and rapidity. With versatile hybrid deployment model provided by leading IAM solutions, connectivity to SaaS applications as well as legacy enterprise web applications happens more quickly as well as securely.

IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud

The significance of cloud and its impact on IAM market outlook

Just as the banking sector is facing the challenge of identity authentication as customers around the world are demanding any time access, the proliferation of IoT and cloud technologies is changing the very texture of the society in multiple ways. With advancement in IoT technologies, the advent of smart cities has gathered considerable traction.

While sensors have been installed in New York that can detect gunshots and alert police, the city of Boston has developed a mobile app helps citizens to report civic problems like burnt out streetlights and potholes. Cities like Paris, Oslo and Hong Kong have large internet- connected statues that are filled with moss to absorb air pollution and notify operators about malfunctions.

The network of connected devices continues to expand and the rise of 5G connectivity is anticipated to be connecting traffic signals, air quality sensors, police patrol cars, etc., over the coming years. Reportedly there would be billions of connected devices around the world by 2020 which will naturally create immense opportunities for identity and access management industry players. This is because new security threats will continue to surface, as without proper security all connected devices are at the risk of being hacked.

The evolution of the smart era – how will it impact IAM market dynamics?

Connected devices that constitute the very fabric of smart cities are essentially IoT devices that would be in the field for the next ten fifteen years and therefore identity and access management must be built into the system from the beginning. As identities, keys and tokens have to be managed every time new devices are added, or old ones are removed and the cloud ecosystem is updated, the security components within devices have to be managed well to extend their lifecycle.

Identity and access management must be built into the system from the beginning

Not only cities but factories are also getting smarter. The term Industry 4.0 came to be first used when the German government used it to define the country’s strategy towards increased digitization in manufacturing. As technologies like IoT and cloud computing continued to expand, they came to be included in the term, and Industry 4.0 came to represent the ecosystem of Internet-connected machines with streamlined and automated workforce and reduced production costs.

As the ecosystem continued to expand, trust and identity became important issues in order to ensure the integrity of a smart factory.

Healthcare is rapidly becoming a fully digital environment

IAM solutions – Influencing the coveted medical domain

Other fields like healthcare have also not been impervious to the effects of technological transition. Healthcare is rapidly becoming a fully digital environment that has reaped the benefits of sophisticated IT tools in delivery of care. This has however exposed sensitive healthcare data to cybercriminals who had attempted to hold critical systems and patient records of hospitals to ransom.

Healthcare is rapidly becoming a fully digital environment

In recent years more than 80% of healthcare institutions have reported that they registered some degree of cyberattacks. Providers and users are increasingly operating from multiple locations, many of which are outside the hospital premises. With users demanding to access systems through a variety of devices, identity and access management has come to witness greater traction from healthcare providers.

Over the coming years, the world will be rapidly adopting 5G networks. Though 5G promises much more speedy services for users and business ecosystems, the technology is also expected to impose greater responsibilities on confidentiality of user data and integrity of applications. Identity and access management industry players had been investing in expansive R&D as cyber threats continue to evolve and introduction of new technologies and advent of IoT drastically changes the relationship that users have with their devices.

Identity and access management is expected to be useful when much more than personal information is at stake. When cyber criminals have the power to hold hospitals or traffic signals to ransom and disrupt daily lives, health and safety become a priority for authorities and security measures have to be tightened.

For instance, after the bank heists in Mexico, the Mexican bank authorities have come to recognize the inevitability for the need of greater control and security of banking networks. Mexican banks have invested heavily over the last year in strengthening their defenses. As such measures against cyberattacks become the norm, identity and access management market is expected to register massive gains over the ensuing years.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

In case you missed it

Secure, Pinpoint Location with UWB-Enabled Indoor Positioning
Secure, Pinpoint Location with UWB-Enabled Indoor Positioning

Indoor positioning is, in many ways, an inside version of the satellite-navigation apps we rely on for outdoor navigation, but with an added twist – it can also be used to help locate people and things. Let’s say you’re at home and misplaced your car keys, or you’re in a grocery store and can’t find your favorite brand of coffee. Or maybe you’re working in a factory and need a particular tool from a storage bin, or you’re a site manager dealing with an emergency and need to make sure everyone’s exited the building. Indoor positioning helps in all these situations, because it can locate items and guide you to where they are. The importance of “where” Knowing where an asset is located in real time is useful in many ways. In industrial settings, it improves item utilization rates and saves time spent searching for things. It opens the door for a new level of “just in time” efficiency on factory floors, and for inventory management in warehouses and retail environments. Safety is another benefit of accurate location, because knowing where people, automatic guided vehicles, and robots are in real time can help prevent accidents and keep people out of harm’s way. Accurate location in real time also enables contextual decision-making, so your smart house adjusts your stereo automatically as you move from to room or lets you control objects by simply pointing at them. Lets you control objects by simply pointing at them Security authorisations based on location is another possibility. Precise real-time location is something that can be hard to fake, so it can be used to restrict access to an area or used to add protections based on where an asset sits, where a piece of data resides, or the origination point of a communication. Getting the technology right Developing an effective technology for indoor positioning requires several things. To begin with, location readings needs to be very precise, with accuracy down to as small an area as possible. The technology has to be secure, because location often needs to be kept private. The technology has to be reliable, even in harsh environments, and easily scalable, too, so it can address the thousands of people and assets in large venues. It has to be low power and affordable, so it can be embedded in everything from high-end, complex devices like smartphones to low-end, simple devices like asset tags. And, of course, the technology has to have latency low enough that it can track movement in real time. Various wireless technologies, including Bluetooth and Wi-Fi, are already used for indoor positioning, but they don’t deliver on the full set of requirements, especially in terms of accuracy. A different kind of wireless, called Ultra-Wideband (UWB) checks all the boxes. It has the potential to change the way we do all kinds of everyday tasks. What is UWB? UWB is based on the IEEE standard 802.15.4a/z, which has been optimized for micro-location and secure communication. UWB is highly accurate. It can pinpoint people and things to within just a few centimeters, making it 100 times more accurate than the current implementations of Bluetooth Low Energy (BLE) and Wi-Fi. UWB is reliable because it has high immunity to various types of interference, including multipath, which is when a wave from a transmitter traveling to a receiver by two or more paths causes interference. UWB also offers very low latency, with update rates of up to 1000 times per second and readings that are as much as 50 times faster than satellite navigation. UWB is also implemented using mainstream technology, so it’s both affordable and optimized for low power. Lastly, UWB leverages distance-bounding techniques defined by the IEEE to provide a level of security that makes it extremely difficult to hack. Ultra-Wideband (UWB) checks all the boxes How is all this possible? Physics! UWB out-performs other location technology because, unlike Bluetooth and Wi-Fi, which transmit narrowband signals and use Received Signal Strength Indicator (RSSI) to determine location, UWB transmits wideband signals (500 MHz) and uses Time-of-Flight to determine location. Already in 40+ verticals UWB is already bringing value to products and services in more than forty verticals covering the consumer, automotive, industrial, and commercial market segments. For example, it brings operational visibility to manufacturing and logistics, helps businesses protect workers, and reduces safety-management costs. UWB also lets robots and drones self-navigate, and enables secure, hands-free access to cars, front doors, and other secure locations. It even helps with contact tracing and social distancing in the fight against COVID-19. Now in smartphones Recent adoption in smartphones means UWB is ready to grow quickly. Developers are using UWB as part of new services, with an eye toward making various everyday activities more convenient and safer. With UWB as part of smartphone apps, purchases will be more secure, accessing your car will be possible without a key fob, and misplaced items won’t stay hidden for long. Retail outlets will use location for targeted marketing, and finding things on store shelves will be easier than ever. Home automation will become seamless, and friends and family will be easy to find even if they’re in a crowd. The question of interoperability Having UWB in smartphones is an important first step Having UWB in smartphones is an important first step toward making UWB an everyday part of life, but interoperability is another key factor, since smartphones have to interact with a wide range of other devices and services. That’s where the FiRa Consortium comes in. Launched just over a year ago, the FiRa Consortium is a member-driven organization of market leaders from the consumer, mobile, industrial, enterprise, and semiconductor industries. FiRa members work collectively to define the future standards that will make interoperability across UWB products a reality. With FiRa making it possible for developers to use UWB in all kinds of new ways, the future of indoor location is really only limited by the developer’s imagination.

What is the Role of Higher Education to Create Next-Gen Security Leaders?
What is the Role of Higher Education to Create Next-Gen Security Leaders?

Traditionally, security industry professionals have often come from backgrounds in law enforcement or the military. However, the industry is changing, and today’s security professionals can benefit from a variety of backgrounds and educational disciplines. The industry’s emphasis on technology solutions suggests a need for more students of computer science, engineering and other technology fields. The closer integration of security with related disciplines within the enterprise suggests a need to prepare through a broad array of educational pursuits. We asked this week’s Expert Panel Roundtable: What is the role of higher education to create the next generation of physical security leaders?

How Innovations In Security Can Increase Freedom And Protect Lives In Our Communities
How Innovations In Security Can Increase Freedom And Protect Lives In Our Communities

People have always had an innate need to feel secure, from building fires at the front of caves that ward off predators in prehistoric times, to today’s efforts of locking your front door. This need for security extends to venturing further afield from the home and is critical for communities to thrive and survive. More than ever, people want to be and feel safe; protected against physical and now biological threats. When it comes to staying safe, populations around the world have recently demonstrated immense adaptability to changing the way we live our lives in order to protect ourselves and others. In the wake of the COVID-19 pandemic, it isn’t strange to walk down a high street and not see swathes of people wearing face masks, where as little as six months ago it may have been an unnerving sight. While wearing a mask may not be a choice made by the majority in ordinary times, people are compliant as it is helping them get back to a “new” normality in day-to-day interactions. The same can be said for the use of technology. Beyond pure security, the technologies used to keep the public safe can become integrated into existing environments to make it easier to stay safe while visiting areas where there could be safety risks. Technologies used to keep the public safe can become integrated into existing environments Technology enabling freedom A good example of this is airports. The aftermath of the 9/11 attacks in 2001 changed how we are checked in at airports before boarding a flight, and I’m sure countless lives have been saved as a result of this more stringent security measures. However, the development of new technologies, which have been created against the backdrop of a more threat conscious world, could mean we are able to relax the experience of going through airport security for travellers. We now have innovations to spot, amongst hordes of people, those who pose a threat, while blending in with the general public. If we are able to make these identifications before an act is committed, we can cut out some of the draconian measures we are all so used to with scanning passengers before travel at a security checkpoint. If this is the case, then we could get to a model whereby you can pass through transport hubs, like airports, more freely, as fewer visible, large, overt checkpoints will be needed. And best of all, these new technologies can protect personal identity and civil liberties, until a threat object or behavior is detected. Concealable security solutions Today, visible checkpoints scan people in masses, using such large, wieldy devices, such as metal detectors, millimetre machines and hundreds of surveillance cameras peeking down from the ceilings. The use of these systems, which can feel intrusive and hold people up as they wait to pass through, can be reduced by employing new, innovative and concealable security solutions that are able to detect threats, but blend in with the existing environment; basically unseen, but always watching. For example, new advancements in magnetic technologies can be concealed in everyday objects that are aesthetically pleasing, such as planter boxes, which people walk past these every day without really noticing. These threat detection sensors, concealed in planter boxes, can scan individuals and their bags for catalogued metal objects. They can distinguish between those that may pose a threat, e.g. gun, knife, rifle, and those that are unlikely to, e.g. phone, keys. With this advanced magnetic technology, it becomes possible to discover weapons on a person's body, allowing for immediate alert notification to onsite security. Beyond physical objects, there are also small, concealable sensors that can detect, diagnose and track airborne trace explosives, chemical warfare agents and volatile organics. These sensors use tuneable electronic signals to detect chemical threats with a parts-per-billion sensitivity and can then send an immediate threat alert to security to investigate further.  Threat detection sensors Innovative threat detection sensors can be integrated with existing security solutions These new, innovative threat detection sensors can be integrated with existing security solutions, such as access control systems, as well as security policies and procedures to enhance the effectiveness and performance of onsite security personnel and first responders. A great example of integration is using AI-driven/computer vision object recognition software with existing CCTV systems to detect visible threats, such as guns or knives. Every second in an early warning notification of a visible weapon drawn can save lives and possibly stop an attack from being carried out. Security and law enforcement can be alerted in real-time of the location and nature of the incident, so that action can be taken immediately. Extending the security perimeter with new detection sensors means security personnel and law enforcement don’t have to rely on someone reaching a checkpoint before a physical or chemical-based weapon is detected. And as these solutions get deployed more and more, awareness of these technologies seep into the marketplace. Would be assailants will be more likely to be deterred, as they think about walking along a path to the building or checkpoint and getting caught before they can instigate an attack. And to my earlier point, it also affords law abiding citizens more freedom to move around public spaces as they do not need to go through the lengthy security checks that we currently experience. Addressing current threats to act fast Unfortunately, annually we are seeing a rise in gun crime and knife attacks in soft target areas, with daily incidents reported across the US and UK. This has been exacerbated, specifically in the US, by the coronavirus pandemic and civil unrest, where gun sales have escalated in recent months - the FBI conducted 3.7m background checks on those wishing to purchase firearms in March 2020, an increase of 1.1m over March 2019. With so many more guns on the street, it increases the opportunity for bad actors to use these weapons with ill intent within their communities. It is important to harden soft target areas where our communities gather, such as schools, churches, resorts, office buildings, and stadiums and arenas. However, the nature of these venues - somewhere to meet, have fun and relax - do not lend themselves to prison-style, fortress-feel security measures. As well as the big, overt and visible technologies mentioned before, can in fact prove targets for terror. However, the good news is that some public sites have started to invest in and install these new innovative weapon detection solutions. This contributes to the creation of a seamless experience for civilians, who are able to enter and enjoy these locations without forsaking the way of life they have come to know and love, without divesting item in their pockets, pat downs, and slow walkthrough security scanners. Making public areas safer Beyond single-site installations at these locations, city managers and city councils are now looking at the widespread deployment of these new, concealable, touchless and unobtrusive security technologies, all with a goal to make their public areas safer. Once a threat is detected in one venue, an alert can be sent out in the immediate area Furthermore, by having an interconnected security system, once a threat is detected in one venue, an alert can be sent out in the immediate area. This will be picked up by other local security personnel in nearby sites, so they can be on guard to protect members of the public around their premises, as well as support law enforcement in finding and neutralising the threat.    We’ve all heard the phrase smart cities, but with innovations in physical and biological threat detection, these cities can be as safe as they are smart.