Essential Guide

Get started Bring yourself up to speed with our introductory content.

Develop an IAM strategy for the mobile enterprise

Introduction

In the past, identity management relied on simple username and password authentication methods and involved only a few types of devices. However, as mobile devices become more prevalent in the workforce, IAM must evolve, as well.

BYOD programs, spurred by the popularity of mobile devices, complicate identity and access management (IAM) because they not only add a slew of different devices, but they also bring about security-related concerns as users begin to work remotely. To account for these additional factors, an IAM strategy should include features such as single sign-on (SSO), multifactor authentication (MFA) and biometric authentication.

It's important to distinguish between the two key components of IAM: authorization and authentication. Authentication is who you are; it includes a user's unique credentials, such as DNA -- biometrics -- or knowledge -- passwords. Authorization, on the other hand, denotes what users can do based on their identities. Both of these components are becoming more complex as IAM evolves.

There is an expectation to use features such as SSO or MFA within an IAM strategy, but these components often present challenges from a user's perspective. It's crucial for IT to maintain a balance of strong security and usability in its IAM strategy.

It's important to explore IAM and determine which features are essential to a mobile-driven enterprise. In this guide, we'll review the different types of IAM and authentication methods. And, because it's essential to be aware of the influx of new features and capabilities that will become available, we'll dive into predictions for the future of IAM.

1Get started with IAM-

Discover options for identity management

The decision to implement IAM is the first step toward securing mobile users, but there's still a long way to go. IT should evaluate different types of authentication and identity methods to decide what type of IAM tool will work best for the organization. IT should also explore the ever-growing IAM feature options and decide which are most important.

Feature

A checklist for IAM research

Before IT rushes to create an IAM strategy, they should answer a few key questions. Will identity management be hosted in the cloud or on premises? Will IT use identity federation? Know the basics before diving in. Continue Reading

Tip

Discover identity federation challenges

Federated identity is useful for employees that often work with external company domains because they don't need to create new credentials for each site. But IT should understand the challenges of federated identity, such as agreeing to standards with other companies. Continue Reading

Answer

Distinguish between two identity concepts

IAM typically includes identity governance and access management. The two terms are similar, but not interchangeable. Note their differences and understand what each term means to develop a strong IAM strategy. Continue Reading

Tip

Tighten password management, overall security

Password management is an essential aspect of identity management that evolved with the proliferation of BYOD. Discover best practices for mobile password management to strengthen an overall IAM strategy. Continue Reading

Tip

How to use MFA for mobile apps

An enterprise mobile app should always use multifactor authentication (MFA) to secure corporate data. But MFA can come with significant challenges for the user, so be prepared to navigate these issues. Continue Reading

2IAM of the future-

Explore new identity technology

The IAM market is changing significantly as users' needs evolve. Modern IAM technologies integrate artificial intelligence and biometrics, and an emerging IAM-as-a-service model provides an appealing option for small businesses that don't want to deal with management. Learn about all of these features and more in this section.

Opinion

Experts predict future IAM trends

While companies once attempted to lock down devices to protect data, IAM is now becoming more prevalent. As new IAM tools integrate technologies such as blockchain, adoption rises -- and will likely continue to do so. Continue Reading

Tip

New expectations arise for modern IAM

An IAM strategy is now more than just a way to manage passwords and user accounts. IT pros expect capabilities such as advanced metrics and integration with directories -- and IAM technologies aim to meet those needs. Continue Reading

Opinion

How AI works with identity management

AI and identity management are a perfect match; AI enhances the security of an IAM strategy by determining whether a user's location and behavior are suspicious. Discover the relationship between AI and IAM and how that will continue to evolve. Continue Reading

Photo Story

Explore the future of authentication

Biometric authentication will soon become the norm for many IAM systems, but there are many different ways to authenticate a user. Learn about the pros and cons of biometrics, from fingerprints to facial recognition. Continue Reading

News

What cloud can do for IAM

Cloud-based IAM can provide a variety of benefits, especially to businesses that don't want to be involved with day-to-day management. IT should learn the pros and cons of IAM-as-a-service to determine whether it's the best fit. Continue Reading

3Terms to know-

IAM terms

As you develop an IAM strategy, it's important to be familiar with the key terminology.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close