Blog

    

Smart Devices Need Smart Identity Management

Posted by Michael Tarbet on 10/14/16 10:12 AM

Sudha Jamthe is the CEO of IoT Disruptions, Stanford CSP IoT instructor and the author of IoT Disruptions 2020, which focuses on innovations at the junction of the Internet of Things (IoT) and Artificial Intelligence (AI). She shares her ongoing research and thought leadership at iotdisruptions.com and her weekly IoT Show.

UnboundID: Tell us about some of the latest technological developments in the field of IoT?

Jamthe: First let me describe IoT because it covers a broad set of technologies. We have IoT for consumers like wearables, IoT for the home such as the Nest thermometer, IoT conncecting our vehicles and IoT for cities to manage traffic lights, parking and all kinds of other services. Then there is industrial IoT, which is where the money is being made today. There are technology innovations happening in all areas of IoT, some gaining adoption more quickly than others.

Two key innovation areas of IoT which I am excited about are autonomous machines and digital health. IoT is driving the next wave of autonomous machines, which includes self-driving cars, robots and drones. A robotics company called Matternet has developed a drone logistics network for deliveries in rugged terrains and another called Zipline is offering drones that carry medicines to inaccessible areas in Rwanda.

Read More

Topics: Internet of Things (IoT)

How to Adopt an Identity-Centric Approach to Digital Business

Posted by Bjorn Aannestad on 8/26/16 9:30 AM

We’re quickly moving toward a future that is identity-centric. In the digital world, identities lie at the heart of several different information ecosystems, including big data, marketing technology and the rapidly evolving Internet of Things (IoT). And as these ecosystems become increasingly business-critical, adopting an identity-centric approach to technology infrastructures will be vitally important to customer experience, security and privacy.

So what does an identity-centric approach look like? Many of today’s Identity and Access Management (IAM) solutions were originally developed to manage workforce identities. While they deliver some of the needed capabilities, there are additional considerations required to support a truly identity-centric focus. You need to be able to create a unique identifier for each person. Then you must be able to authenticate the user and authorize their access to various systems and apps. Additionally, you need the ability to manage dynamic profiles that consist of a combination of structured and unstructured data, including demographics, preferences and relationships.

Read More

Topics: Consumer Identity and Access Management, Internet of Things (IoT)

From IoT to Blockchain, the Pace of Digital Evolution Is Accelerating

Posted by Dave Malcolm on 8/25/16 11:14 AM

Phil Windley is an Enterprise Architect in the Office of the CIO at Brigham Young University. He is also the co-founder and organizer of the Internet Identity Workshop (IIW), serves as an Adjunct Professor of Computer Science at BYU, writes the popular Technometria blog, and is the author of the books “The Live Web” (Course Technology, 2011) and “Digital Identity” (O'Reilly Media, 2005).

UnboundID: What were the hot areas of discussion at the latest IIW event?

Windley: Generally, it’s a mix of topics, those that have been part of IIW for a long time, like OAuth and multi-factor authentication. We also had a lot of discussions on block chain technology, the distributed decentralized ledger system for Bitcoin. The key idea of block chain is that it allows you to create an identity system that is not controlled by any single entity. Today, if I log into a website and I have the option of using Google or Facebook credentials to do that, it’s very convenient. It saves people a lot of headaches and also allows for some security wins because Google and Facebook put a lot of effort into building identity systems. Yet the identity is still controlled by those big companies. Not everyone likes that idea. They might be worried about privacy or maybe they don’t have an account at one of those sites and they don’t want to create one. Distributed ledger technology creates a system where everyone can join. It’s not controlled by a single entity, but rather by code written by a group of people. It completely decentralizes the identity management system.

Read More

Topics: Internet of Things (IoT), Cloud Computing, Expert Interviews

Is Artificial Intelligence the Next Frontier for Identity Management?

Posted by Derick Townsend on 8/12/16 10:16 AM

Identity management professionals have seen significant changes in the industry in recent years, and the pace of change is only accelerating. In the past, workforce Identity and Access Management (IAM) evolved to keep up with a growing need for access to workforce systems. Now Customer Identity and Access Management (CIAM) is critically important as businesses undergo digital transformation and engage with customers across multiple apps and channels. 

Read More

Topics: Consumer Identity and Access Management, Internet of Things (IoT), Security Best Practices

The Internet of Things Demands a New Identity Management Approach

Posted by Steve Shoaff on 7/20/16 9:30 AM

A study conducted by BI Intelligence predicts there will be 24 billion Internet of Things (IoT) devices by the year 2020. It’s a staggering growth rate that signals dramatic changes for the way we live, how brands connect with customers, and how businesses manage operations.

According to new research from Forrester, Identity and Access Management (IAM) is at the center of IoT’s evolution. IoT is about increasing software control of the physical world. That entails managing billions of connections between devices and humans. The result is the emergence of a new IAM discipline, IAM for IoT.

Read More

Topics: Consumer Identity and Access Management, Internet of Things (IoT)

VLOG: 2016 Cloud Identity Summit Showcased Innovation

Posted by Steve Shoaff on 6/17/16 9:30 AM

Once again the Cloud Identity Summit (CIS) hosted by Ping Identity did not disappoint. The 2016 event held in New Orleans, Louisiana featured more speakers and content than previous years. The growing attendee and vendor list is a strong indicator of how the identity industry is quickly evolving in scope and size.

Read More

Topics: Consumer Identity and Access Management, Internet of Things (IoT), Videos

Explosive IoT Growth Expands Scope of Identity Management

Posted by Derick Townsend on 4/8/16 9:30 AM

More and more, Identity and Access Management (IAM) professionals are being pulled into projects that go beyond their traditional purview of workforce identity management. Their scope of influence and responsibility is expanding into customer-facing strategic business initiatives as new technologies transform the edge of the enterprise. In addition to Customer Identity Management projects that support digital consumer engagement, a major trend demanding increased IAM involvement is the Internet of Things (IoT).

To say that IoT is growing fast is an understatement. Gartner says that the number of IoT devices has increased by as much as 30 percent since last year, and their 2016 prediction that stated 5.5 million new things will be connected to the Internet each day is now reality.

Read More

Topics: Internet of Things (IoT), Videos

Knocking Down Barriers to Internet of Things Adoption

Posted by Ishan Kumar on 3/9/16 9:30 AM

From smart cities and smart factories to smart homes and wearables, we are just beginning to scratch the surface of possible use cases for connected devices. The Internet of Things (IoT) has the potential to collect valuable data from all facets of our lives and use it to make tasks more convenient, save money, and create a greener world, to name a few of the benefits. For example, smart grid initiatives in cities are expected to achieve $10.7 billion savings annually by 2019 through reduced energy consumption and emissions in smart cities. Additionally, smart homes are expected to save consumers as much as 10 percent

Businesses are rapidly pushing forward with IoT initiatives by connecting 5.5 million new things each day. However, we still have a long way to go before IoT is widely adopted and becomes an everyday part of mainstream life. Market entry barriers to IoT are lower than ever before with low-priced devices, processing power and Internet bandwidth combined with fast computational and network speeds. Yet, there are steep challenges that need to be addressed before IoT poses more possibilities than problems. 

Read More

Topics: Internet of Things (IoT)

Identity-Centric IoT Increases Safety for Emergency Responders

Posted by Emeka Obianwu on 2/17/16 10:01 AM

There is a lot of hype and buzz around how the Internet of Things (IoT) is already beginning to make our day-to-day lives easier. With smart homes, smart cars and a myriad of smart consumer gadgets, we can harness the power of data and connected things to make informed decisions and automate mundane tasks. But IoT isn’t only about making life easier; in some cases internet-connected devices could make a positive difference in saving a life.

First responders in emergency situations depend on accurate information to make split-second decisions under dangerous circumstances. While inaccurate, old or compromised data in everyday scenarios may result in inconvenience and lost time or money, lack of dependable data in emergencies could result in far worse—injury or death.

Read More

Topics: Internet of Things (IoT)

Internet of Things Momentum Depends on Identity Management

Posted by Dave Malcolm on 2/12/16 8:00 AM

Businesses are placing high strategic value on the Internet of Things (IoT), and Cisco's recent acquistion of IoT company Jasper Technologies for $1.4 Billion perfectly illustrates this point. As companies hone their focus on digital customer experiences, they are investing heavily in IoT initiatives that expand convenient, data-driven service and product offerings through Internet-connected devices. 

In addition to sensors and networking capabilities, another technology needed to drive IoT forward is data management, specifically identity data management. A defining characteristic of IoT is that people, devices and apps all have digital identities, and a tremendous volume of data is generated and used by each one. Identity management is a key enabler of IoT's data-intense relationships between people, devices and apps.

Read More

Topics: Internet of Things (IoT), Videos