<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1448210&amp;fmt=gif">

Identity and Access Management Solutions for the IoT

Price: Starting at USD 3,000
Publish Date: 05 Jul 2021
Code: AN-5242
Research Type: Report
RELATED SERVICE: OT Cybersecurity
Actionable Benefits

Actionable Benefits

  • Explore an IoT-focused framework for Identity and Access Management bolstered with cloud, data, device and user-centric insights.
  • Ascertain the key opportunities and challenges when tackling a hybrid version of IAM fused with both user and machine ID, IoT security and device management, along with cloud operations and data governance.
  • Evaluate whether or not it matters to incorporate a version of IoT machine ID from devices, software, APIs and cloud platforms onto the existing user ID archetype of traditional IT IAM.
Research Highlights

Research Highlights

  • Cloud operations and management platforms, public key infrastructure and IoT device management, software tools, application programming interfaces, data security and governance are among the top technologies that could compliment a more inclusive framework of IoT IAM.
  • However, it is important to understand that IoT IAM should not be confused with digital security options in IoT and a proper digital identity and access control framework needs to be incorporated that assists rather than hinders organizational expansion.
  • Data analytics and intelligence operations, shadow IT, data governance, compliance and regulations, IoT device authentication and next-gen gateways among directory-as-a-service and managed IAM solutions are brought into the fray of IoT IAM, albeit with various degrees of success.
Critical Questions Answered

Critical Questions Answered

  • How should a more inclusive version of IAM be tackled in the larger IoT ecosystem?
  • How do different vendors see the expansion of digital identities and access control evolving in the IoT?
  • What are the key technological features that implementers need to keep in mind?
Who Should Read This?

Who Should Read This?

  • Connectivity and cloud service providers.
  • OEMs, gateway, device and embedded hardware security manufacturers.
  • Encryption specialists, digital certificate and device identity players.
  • IoT digital security service providers.
  • Governmental, regulatory and standardization organizations.

Companies Mentioned

Advantech
Cisco
Entrust
Giesecke+Devrient
GlobalSign
IBM Corp
Intel Corporation
Microsoft Corporation
USA Firmware

Table of Contents

1. EXECUTIVE SUMMARY

2. IAM IN IT AND OT

2.1. IT IAM
2.2. IoT IAM

3. EXAMINATION OF THE IOT IAM ECOSYSTEM

3.1. IoT IAM Framework
3.2. Cloud ID and Security
3.3. Data Security and Governance
3.4. IoT Device Authentication and Access Control

4. VENDOR PROFILES

4.1. IBM
4.2. Microsoft Azure
4.3. Cisco
4.4. Entrust
4.5. GlobalSign
4.6. Advantech
4.7. Giesecke+Devrient
4.8. ForgeRock

Companies Mentioned

  • Advantech
  • Cisco
  • Entrust
  • Giesecke+Devrient
  • GlobalSign
  • IBM Corp
  • Intel Corporation
  • Microsoft Corporation
  • USA Firmware