BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

Develop an IAM strategy for the mobile enterprise

Last updated:June 2018

Editor's note

In the past, identity management relied on simple username and password authentication methods and involved only a few types of devices. However, as mobile devices become more prevalent in the workforce, IAM must evolve, as well.

BYOD programs, spurred by the popularity of mobile devices, complicate identity and access management (IAM) because they not only add a slew of different devices, but they also bring about security-related concerns as users begin to work remotely. To account for these additional factors, an IAM strategy should include features such as single sign-on (SSO), multifactor authentication (MFA) and biometric authentication.

It's important to distinguish between the two key components of IAM: authorization and authentication. Authentication is who you are; it includes a user's unique credentials, such as DNA -- biometrics -- or knowledge -- passwords. Authorization, on the other hand, denotes what users can do based on their identities. Both of these components are becoming more complex as IAM evolves.

There is an expectation to use features such as SSO or MFA within an IAM strategy, but these components often present challenges from a user's perspective. It's crucial for IT to maintain a balance of strong security and usability in its IAM strategy.

It's important to explore IAM and determine which features are essential to a mobile-driven enterprise. In this guide, we'll review the different types of IAM and authentication methods. And, because it's essential to be aware of the influx of new features and capabilities that will become available, we'll dive into predictions for the future of IAM.

1Explore new identity technology

The IAM market is changing significantly as users' needs evolve. Modern IAM technologies integrate artificial intelligence and biometrics, and an emerging IAM-as-a-service model provides an appealing option for small businesses that don't want to deal with management. Learn about all of these features and more in this section.

2IAM terms

As you develop an IAM strategy, it's important to be familiar with the key terminology.

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close