Nelson Cicchitto, CEO of Avatier has come up with 9 top IAM security trends for 2014.
1) Companies continue to experience less value and lowered information security than anticipated from outsourced IT operations.
Outsourcing relationships continue to be focused on IT operations, and as a result, they can negatively impact security, as outsourcers must make decisions based on cost savings vs. security.
2) Organizations that embrace efficiency look to experience better access control, governance and security at a lower cost.
Identity and access management (IAM) continues its transition from information technology to an overall business enablement tool.
3) The legacy of failed Identity Management implementations will finally be overcome.
Rather than thinking strategically with a full business view of one-time costs, ongoing costs and operational efficiencies, organizations look primarily at software licensing costs when making decisions.
4) An identity governance and administration focus will prove to be essential.
The days when IT operates in a silo are over as technology becomes embedded in all aspects of the business.
5) Security leaders continue to drain their time and efforts complaining about budgets and upper management support
Numerous technology improvements and best practices will keep security leaders scrambling to examine and execute ahead of corporate risk.
6) Small and medium size businesses will embrace Cloud Identity Management.
While IAM solutions are increasing their capabilities to manage cloud accounts, cloud providers are also creating APIs to allow for direct access management.
7) Although key compliance and best practice regulations such as PCI-DSS, HIPAA, SOX, FIPS 200, and NIST 800-53 all require privileged access controls, whether executives take action, remains to be determined.
Granting access is one thing, but continually monitoring and attesting to who has this access becomes a critical activity.
8) The supply of qualified highly skilled labor will not keep up with demand as enterprises seek ways to automate IT operations to the fullest.
The right employees will need a new combination of skills so enterprises can expect to pay high salaries for the few that have them.
9) As hackers target credit card information, requests for an enterprise focus on PCI Data Security Standard (PCI DSS) will come from the boardroom.
The Target security breach started on their store payment systems and spread to their enterprise systems.
For more information visit: http://blog.avatier.com/2014-identity-management-security-predictions/
Nelson Cicchitto | Chairman and CEO of Avatier
Avatier Corporation offers identity management software, services, and audit controls that transform how an enterprise operates. Avatier identity management combines business technology with innovation to reduce an organization’s identity and access management risks and promote cyber security. From our unique user provisioning IT Store, to our cost-saving self-service password reset tool, and universal mobile client access certification software, Avatier delivers strategic value to IT operations while lowering costs. Avatier offers ITIL service catalog user provisioning, group management software, a compliance management system, and password management software that expand IT cyber security and improve your bottom line.
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.