{"id":1910,"date":"2019-08-27T03:01:59","date_gmt":"2019-08-27T03:01:59","guid":{"rendered":"http:\/\/kusuaks7\/?p=1515"},"modified":"2024-04-24T16:37:30","modified_gmt":"2024-04-24T16:37:30","slug":"ten-trends-coming-up-in-identity-and-access-management-for-2020","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/ten-trends-coming-up-in-identity-and-access-management-for-2020\/","title":{"rendered":"Ten Trends Coming Up in Identity and Access Management for 2020"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1910\" class=\"elementor elementor-1910\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-ee1ab58 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ee1ab58\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1542f9d9\" data-id=\"1542f9d9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58dfd55f elementor-widget elementor-widget-text-editor\" data-id=\"58dfd55f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe future of innovation in identity access management (IAM) includes increased use of biometrics, the blockchain technology used in identity management systems, IAM for cloud services, and edge computing with IoT devices.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bc62a1 elementor-widget elementor-widget-image\" data-id=\"3bc62a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.techfunnel.com\/wp-content\/uploads\/2019\/08\/10-Trends-Coming-Up-in-Identity-and-Access-Management-for-2020-1.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b582916 elementor-widget elementor-widget-heading\" data-id=\"b582916\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Biometrics Used for Identity Access Management<\/strong><\/h2>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85b038d elementor-widget elementor-widget-text-editor\" data-id=\"85b038d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOne of the megatrends is to more fully incorporate biometrics such as fingerprints, retinal scans, and facial recognition to better identify authorized users for networked systems. At first glance, this seems to provide a fool-proof way for systems to recognize individual people with near certainty by using their unique biometrics.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-adbaf73 elementor-widget elementor-widget-heading\" data-id=\"adbaf73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Increased Security Risk from Using Biometric Data<\/strong><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0a73d1 elementor-widget elementor-widget-text-editor\" data-id=\"a0a73d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt is counter-intuitive to realize that using biometrics may increase security risk. They introduce a vast array of new cyber-attacks that are possible with the fraudulent use of the stolen biometric information. The problem is that unlike a complex password, which can be changed if compromised, a person\u2019s biometrics cannot be changed. Biometric information is permanent. If the biometric data is stolen it cannot never again be used for identity verification thereafter with any certainty.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bdf286 elementor-widget elementor-widget-heading\" data-id=\"3bdf286\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Beware of the Theft of Biometric Data<\/strong><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7bacc7 elementor-widget elementor-widget-text-editor\" data-id=\"a7bacc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tA case in point is the recently announced huge breach of biometrics data experienced by\u00a0<a href=\"https:\/\/www.supremainc.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Suprema<\/a>\u00a0as reported by\u00a0<a href=\"https:\/\/techerati.com\/news-hub\/biometrics-data-police-breach-cyber\/\" target=\"_blank\" rel=\"noopener noreferrer\">Techerati<\/a>. Before this breach, Suprema was considered a global security leader in biometric access control systems. Suprema owns a database called Biostar 2 that is integrated with the\u00a0<a href=\"https:\/\/www.nedapsecurity.com\/solutions\/aeos-access-control\/\" target=\"_blank\" rel=\"noopener noreferrer\">AEOS<\/a>\u00a0access management system created by Nedap. AEOS used by more than 5,700 organizations worldwide in over 80 countries, including UK law enforcement. Nedap\u2019s slogan is \u201cImagine you don\u2019t have to worry about security.\u201d Oh, really?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-904a001 elementor-widget elementor-widget-text-editor\" data-id=\"904a001\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe data breach of Suprema\u2019s Biostar 2 database involved 23 GB of highly sensitive, unencrypted confidential data files that included usernames, passwords, personal information, facial recognition data, and millions of fingerprints.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cb2867 elementor-widget elementor-widget-text-editor\" data-id=\"0cb2867\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThere is no need for the presence of the physical person if their biometric data files are compromised. All that is needed is their data. Theoretically, the millions of those fingerprints are now permanently no longer useful for identification because they are compromised. It is time to rethink the usefulness of biometric data. It may provide a false sense of security that is not warranted for network-wide deployment.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f13276 elementor-widget elementor-widget-text-editor\" data-id=\"2f13276\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn the future, IAM that uses biometric data needs further security work to protect the biometric data from being compromised. Third-party risk of the biometric data being compromised is a real problem for a company like Nedap that relied on a company like Suprema to protect the biometric data.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27b0980 elementor-widget elementor-widget-heading\" data-id=\"27b0980\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Blockchain and Identity Access Management<\/strong><\/h2>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3151627 elementor-widget elementor-widget-text-editor\" data-id=\"3151627\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBlockchain technology applied to identity access management attempts to address the problems with maintaining identification information in a centralized system. As demonstrated with the breach of Suprema\u2019s biometric database, having all the identification information in the hands of a third-party creates the risk that they will not adequately protect the information.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c2b2d1 elementor-widget elementor-widget-text-editor\" data-id=\"9c2b2d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMoreover, the personal identification information in such centralized systems is not controlled by the individuals. Instead, the information is owned by the third-party services provider. This may be a fatal flaw with such centralized designs that\u00a0<a href=\"https:\/\/www.techfunnel.com\/fintech\/blockchain-the-importance-of-digital-identity-in-finance\/\" target=\"_blank\" rel=\"noopener noreferrer\">blockchain technology<\/a>\u00a0can address.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b0061 elementor-widget elementor-widget-heading\" data-id=\"a7b0061\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Self-Sovereign Identity<\/strong><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ba9ccc elementor-widget elementor-widget-text-editor\" data-id=\"5ba9ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe identity information of a person should be their personal property that they control. This concept is called self-sovereign identity.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-493c5b6 elementor-widget elementor-widget-text-editor\" data-id=\"493c5b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tKeeping this information protected by encryption in a permanent blockchain using a decentralized distributed network system, gives the individual full control over the data. This avoids the conventional security risks of data stored in a centralized database.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48623cb elementor-widget elementor-widget-heading\" data-id=\"48623cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Blockchain Smart Contracts for IAM<\/strong><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c758c10 elementor-widget elementor-widget-text-editor\" data-id=\"c758c10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOne proposal is to use blockchain technology to create a\u00a0<a href=\"https:\/\/www.mdpi.com\/2076-3417\/9\/15\/2953\/pdf\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">smart contract-based IAM system<\/a>\u00a0that allows users to control their identities and associate them with certain attributes in order to achieve the goal of self-sovereign identity.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f92806 elementor-widget elementor-widget-heading\" data-id=\"7f92806\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Identity Access Management for Cloud Services<\/strong><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68fb01a elementor-widget elementor-widget-text-editor\" data-id=\"68fb01a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAnother important one of the\u00a0<a href=\"https:\/\/techvisionresearch.com\/wp-content\/uploads\/2018\/01\/The-Future-of-Identity-Management-2018-final.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">identity and access management trends<\/a>\u00a0is the role of\u00a0<a href=\"https:\/\/www.techfunnel.com\/information-technology\/what-is-the-role-of-cloud-user-access-management-software\/\" target=\"_blank\" rel=\"noopener noreferrer\">cloud user access management software<\/a>. Digital identity is very important when using cloud-based services. For example, the largest cloud services provider in the world is Amazon Web Services (AWS).\u00a0<a href=\"https:\/\/www.techfunnel.com\/information-technology\/identity-access-management-in-aws\/\" target=\"_blank\" rel=\"noopener noreferrer\">IAM in AWS<\/a>\u00a0is a critical function to make sure only authorized users have access to critical data and applications and\u00a0<a href=\"https:\/\/www.techfunnel.com\/information-technology\/what-is-customer-identity-and-access-management%E2%80%AF\" target=\"_blank\" rel=\"noopener noreferrer\">customer identity<\/a>\u00a0is managed for security risks.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bbddc9 elementor-widget elementor-widget-heading\" data-id=\"5bbddc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>IAM and Single Sign-On Systems<\/strong><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13ad164 elementor-widget elementor-widget-text-editor\" data-id=\"13ad164\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOne of the IAM trends is to use single sign-on (SSO) systems with\u00a0<a href=\"https:\/\/www.techfunnel.com\/martech\/benefits-and-solutions-of-multi-factor-authentication\/\" target=\"_blank\" rel=\"noopener noreferrer\">multi-factor authentication<\/a>\u00a0that grants privileged access to hybrid systems that may consist of cloud services combined with on-premises networks.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4bcbd1 elementor-widget elementor-widget-text-editor\" data-id=\"c4bcbd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMany providers are now offering\u00a0<a href=\"https:\/\/www.techopedia.com\/definition\/30847\/identity-and-access-management-as-a-service-iamaas\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">identity access management as a service (IAMaaS)<\/a>\u00a0that provide the\u00a0<a href=\"https:\/\/www.onlinewhitepapers.com\/information-technology\/the-benefits-of-single-sign-on-across-all-applications\/\" target=\"_blank\" rel=\"noopener noreferrer\">SSO function<\/a>based on the demand for these solutions. These solutions will continue to grow along with the increased migration to cloud services.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de3a2e1 elementor-widget elementor-widget-heading\" data-id=\"de3a2e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>IAM and the Internet of Things<\/strong><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2cb797 elementor-widget elementor-widget-text-editor\" data-id=\"a2cb797\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe explosive growth of the Internet of Things (IoT) comes along with a huge need for secure identity access management. Every type of IoT device added to a network increases the security risk exponentially.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5f6035 elementor-widget elementor-widget-text-editor\" data-id=\"d5f6035\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFor example, security camera systems in smart homes that are meant to improve security can be hacked by unauthorized users to spy on the occupants. Something as innocuous as being able to turn on a hot tub, to heat the water before using it, can tell a criminal hacker that the residents are not in the interior of the house, giving them an opportunity to burglarize the place.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-187aaed elementor-widget elementor-widget-text-editor\" data-id=\"187aaed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOther examples of risks include inexpensive IoT devices that used biometrics, such as a fingerprint scan, to activate them. Most of these devices are not storing the fingerprint data securely.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82d8489 elementor-widget elementor-widget-text-editor\" data-id=\"82d8489\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIoT devices that collect personal medical information are good for tracking health issues; however, who controls the data collected and the uses that can be made of the data are areas of serious concern.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1ca82d elementor-widget elementor-widget-text-editor\" data-id=\"f1ca82d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAnother area that developers are working on for IAM systems, is to create the ability for the system to authenticate the access needed by a huge number of devices. One solution is to push as much of the computational needs out to the \u201cedge.\u201d This makes the devices do as much of the processing of the information as possible.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1424b6c elementor-widget elementor-widget-text-editor\" data-id=\"1424b6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn many cases, securing IoT devices will be achieved by having the device identities embedded in the processing chip of the device as an integral part of the hardware.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c496064 elementor-widget elementor-widget-text-editor\" data-id=\"c496064\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMuch work still needs to be done to provide an overview of networked IoT devices that is useful for system managers. The goal for IoT connected devices is to leverage the collection of data from the devices by linking it directly to the business systems. However, this linkage creates a huge security risk if not managed properly.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91f4648 elementor-widget elementor-widget-heading\" data-id=\"91f4648\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Context-Based Identity and Artificial Intelligence<\/strong><\/h2>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f45eed4 elementor-widget elementor-widget-text-editor\" data-id=\"f45eed4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tContext-based identity management correlates data about an individual user that is relevant for the identity being authenticated. Relevant data includes many factors such as behavioral patterns, physical locations, preferences, usage, and system information such as an IP address and a machine address.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a9335d elementor-widget elementor-widget-text-editor\" data-id=\"8a9335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tUsing artificial intelligence (AI) programming algorithms to data-mine the Big Data can uncover the relevant data patterns as part of the data analytics. This type of analysis is already being extensively used by the banking systems globally to reduce fraud.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3462dc9 elementor-widget elementor-widget-text-editor\" data-id=\"3462dc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAI-based machine-learning systems can get to know a person so well that all the data collected about them, combined with multi-factor authentication, will securely identify most people.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68ec57a elementor-widget elementor-widget-heading\" data-id=\"68ec57a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Conclusion<\/strong><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a226c4 elementor-widget elementor-widget-text-editor\" data-id=\"7a226c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIdentity access management will continue to grow in scope and scale. Biometrics may be useful; however, it should not be solely relied upon for identification. Blockchain technology may be a better choice for those who want to control their identity. Ease-of-use for cloud-based offerings is driving the demand for\u00a0<a href=\"https:\/\/www.techfunnel.com\/information-technology\/what-is-web-sso-and-how-does-it-work\/\" rel=\"noopener\">single sign-on services<\/a>. Expansion of the IoT requires scalable and reliable infrastructure to establish the identities of the billions of new IoT devices and manage them via a massive network.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9d2f19 elementor-widget elementor-widget-text-editor\" data-id=\"d9d2f19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nEmbrace the cloud because it is pervasive and continues to grow. Explore innovative applications of blockchain technology to develop new forms of\u00a0<a href=\"https:\/\/www.techfunnel.com\/information-technology\/why-digital-identity-is-important-in-todays-world\/\" rel=\"noopener\">digital identity management<\/a>. Work with IAM solutions that may not yet be perfect, yet are flexible, governable, and scalable.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Identity access management will continue to grow in scope and scale. Biometrics may be useful; however, it should not be solely relied upon for identification. Blockchain technology may be a better choice for those who want to control their identity. Ease-of-use for cloud-based offerings is driving the demand for&nbsp;single sign-on services. Expansion of the IoT requires scalable and reliable infrastructure to establish the identities of the billions of new IoT devices and manage them via a massive network.<\/p>\n","protected":false},"author":623,"featured_media":3744,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[95],"ppma_author":[3341],"class_list":["post-1910","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-big-data-amp-technology"],"authors":[{"term_id":3341,"user_id":623,"is_guest":0,"slug":"danni-white","display_name":"Danni White","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_b2fbc49a-2e99-4ebc-b14c-99ede02791a1-150x150.jpg","user_url":"http:\/\/www.bython.com","last_name":"White","first_name":"Danni","job_title":"","description":"Danni White is Director of Content Development at Bython Media, the parent company of TechFunnel.com, OnlineWhitepapers.com, BusinessWorldIT.com, List.Events, and TheDailyPlanIOT.com. She is also Editor-in-Chief at TechFunnel.com."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/623"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=1910"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1910\/revisions"}],"predecessor-version":[{"id":36742,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1910\/revisions\/36742"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3744"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=1910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=1910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=1910"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=1910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}