NEW YORK, January 9, 2014 — / — CA Technologies (NASDAQ: CA) today announced its predictions in identity and access management (IAM) and their impact on security professionals in 2014.

“We believe that the technology trends of cloud, mobile and social will continue to heavily influence the direction and need for IAM in 2014, but we also see new business demands and enabling technologies joining in to put a twist on the IAM and security path for many organizations,” said Mike Denning, senior vice president and general manager, Security business, CA Technologies.

Identity and Access Management in 2014 – a prediction of what’s ahead:

1. The software-defined, open enterprise emerges: The enterprise is remaking itself into a platform that developers can experiment with and innovate on. Every IT layer from data to application to infrastructure to network is becoming service-enabled and software-defined through APIs. The pattern extends beyond the data center to partners and cloud services as enterprises are forced to open up. A new wave of innovation will be ushered in as developers both inside and outside the enterprise gain access to the core building blocks that define an organization. This will speed experimentation and innovation as they construct new mashups leveraging the full range of software defined assets. Traditional IT departments will need to evolve to protect and secure access to these new assets as building blocks for agile development.

2. Hardware elements in mobile devices will become an increasingly important part of IAM: Users will continue to adopt new mobile devices on a short (12-24 month) cycle, rapidly making advanced hardware security technologies, such as ARM TrustZone, widely available. Device manufacturers will build security systems, such as Samsung Knox, on top of these technologies. These systems will help solve the BYOD challenges enterprises face by providing secure ways to separate corporate and personal data and applications. In addition to securing the devices themselves, users will be able to use them to identify themselves to other systems and to perform advanced functions like secure payments. The phone will finally begin to establish itself as the primary and secure way of authenticating users and proving identity.

3. Lack of scalable identity proofing will continue to vex broader B2C/G2C deployments: The recent online user experiences as part of the Obamacare rollout demonstrated the logistical challenges of validating online identities in an accurate and scalable manner. As more and more users enroll in online services, demand for identity proofing services will increase significantly, but organizations will continue to experience identity proofing challenges. While the sources for identity proofing data will continue to expand with the digitization and exposure of new public and private records, this continued demand for identity proofing in 2014 will force the industry to collaborate and partner more closely to deliver scalable identity proofing to meet these needs.

4. The CMO will become a new force for broad identity management initiatives: Successful marketing depends on understanding customers’ needs and providing them with a convenient experience for registration and enrollment. Allowing social login and maintaining a corporate presence on social networks provides an opportunity to capture valuable customer data, including user identities, social interaction patterns, and browsing and buying tendencies. The CMO will press for these capabilities to help the enterprise engage with its customers, develop a stronger relationship with them, and improve loyalty. Identity management infrastructures that support these marketing initiatives will experience improved demand as “business enablement” gains wider recognition as a critical driver of IAM.

5. Risk-based authentication expands beyond Financial Services: While corporate desire for employee and customer mobile enablement is strong, security mechanisms that are cumbersome for consumers accustomed to instant access are met with resistance or all-out avoidance. The need for both stronger authentication and a positive user experience will lead to the widespread adoption of risk-based authentication, in which contextual data about users, devices, applications, locations and other potential risk factors are collected and analyzed to determine a risk-level for the user’s identity. Financial Services has been a leader in the adoption of risk-based authentication due to the high value of many customer transactions. But, this technology will begin to be more widely adopted across other industries as the need for improved security without impacting user convenience increases.

About CA Technologies
CA Technologies (NASDAQ: CA) provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data and identities, from the data center to the cloud. Learn more about CA Technologies at

Follow CA Technologies

  • Twitter
  • Social Media Page
  • Press Releases

Legal Notices
Copyright © 2014 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. 11749. All other trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.

Press Contact
Leanne Agurkis
CA Technologies
Phone: (386) 738-1912

Source: CA


General Tags: compare online backups, online backup news, backing up online, online backup reviews, online file backup, cloud computing, CEO interviews, online backup providers directory, software as a service, online file storage, SaaS, online backup services, online data backup, online backup, online backup companies, top rated online backups, data security, data storage

Like us on Facebook

Do you like this post? Subscribe to our RSS feed ===========================


Related posts:

  1. Newsbyte: SAP HANA® Cloud Platform Identity Provisioning Service Optimizes Identity and Access Compliance Processes
  2. ID Agent Adds Timely 3-in-1 Identity and Access Management Solution Passly to New Digital Risk Protection Platform
  3. Webroot Unveils Webroot Internet Security Complete, Identity Management, Secure Access, And Online Storage, While Protected By The Cloud Anytime, Anywhere
  4. SaferPass is Evolving Online Identity Management by Providing Simple Solutions that Solve Real-world Problems for Consumers and SMBs
  5. Computerbilities Predicts 2014 IT Trends and How to Take Advantage of Them
  6. Arcserve Predicts Public Clouds Lose the Battle for DR Budgets; Names the Trends That Will Rule Data Protection in 2019
  7. HubStor Advances Cloud Data Management with Identity Intelligence
  8. Business and IT Emerge as Essential Allies in the Move to Social IDs and ‘Bring Your Own Identity’
  9. Dobson Technologies Launches New Corporate Identity and Website
  10. Protect Sensitive Data and Keep Kids Safe Online 24/7 with BullGuard Identity Protection