Identity Management For Businesses In An IoT World

The emergence of internet of things (IoT) has altered the requirements for identity and access management (IAM) in businesses. With a vast amount of electronic devices communicating directly with each other, IAM in an IoT world is no longer just about defining a relationship between a human and a machine. All IoT entities, be it people, application, services or devices require an identity. Here are some tips from Gartner on implementing a successful IAM strategy for IoT within organisations.

Identity management image from Shutterstock

IoT has made a lot of current day identify management approaches ineffective which compromises everything from endpoint security and network architecture to application development and data management, according to the analyst firm Gartner. Businesses need to adopt a new approach to viewing and implementing processing, analytics, storage and communications in order to put in place a successful IAM strategy, Gartner research vice-president Earl Perkins said:

Begin by identifying devices as you do people. IoT requires identification for each and every participant in an IT ecosystem — people, software that makes up systems, applications and services, and devices — and all entities will have the same requirements to interact. In networks, these identities may be IP addresses; in devices they may be embedded keys or electronic tags; and in people they are user IDs of some kind.
The Identity of Things (IDoT) is a new component to identity management that encompasses all entity identities. These identities allows you to define relationships among the entities — between a device and a human, a device and another device, a device and an application/service, or a human and an application/service.
IAM leaders and technology service providers (TSPs) should incorporate IDoT’s relationship concepts into identity data and policy planning to support the scale and flexibility required by business moments using the IoT. In fact, the concept of dynamic relationships is critical to the success of future IAM solutions because it allows the IDoT to exist and become part of new responsibilities for IAM in the enterprise.

You can find out more on this topic over at the Smarter With Gartner Blog.

[Via Smarter With Gartner Blog]

The Cheapest NBN 50 Plans

Here are the cheapest plans available for Australia’s most popular NBN speed tier.

At Lifehacker, we independently select and write about stuff we love and think you'll like too. We have affiliate and advertising partnerships, which means we may collect a share of sales or other compensation from the links on this page. BTW – prices are accurate and items in stock at the time of posting.