1-9-14 9:00 AM EST | Email Article

CA Technologies (NASDAQ:CA) today announced its predictions in identity and access management (IAM) and their impact on security professionals in 2014.

“We believe that the technology trends of cloud, mobile and social will continue to heavily influence the direction and need for IAM in 2014, but we also see new business demands and enabling technologies joining in to put a twist on the IAM and security path for many organizations,” said Mike Denning, senior vice president and general manager, Security business, CA Technologies.

Identity and Access Management in 2014 – a prediction of what’s ahead:

  1. The software-defined, open enterprise emerges: The enterprise is remaking itself into a platform that developers can experiment with and innovate on. Every IT layer from data to application to infrastructure to network is becoming service-enabled and software-defined through APIs. The pattern extends beyond the data center to partners and cloud services as enterprises are forced to open up. A new wave of innovation will be ushered in as developers both inside and outside the enterprise gain access to the core building blocks that define an organization. This will speed experimentation and innovation as they construct new mashups leveraging the full range of software defined assets. Traditional IT departments will need to evolve to protect and secure access to these new assets as building blocks for agile development.
  2. Hardware elements in mobile devices will become an increasingly important part of IAM: Users will continue to adopt new mobile devices on a short (12-24 month) cycle, rapidly making advanced hardware security technologies, such as ARM TrustZone, widely available. Device manufacturers will build security systems, such as Samsung Knox, on top of these technologies. These systems will help solve the BYOD challenges enterprises face by providing secure ways to separate corporate and personal data and applications. In addition to securing the devices themselves, users will be able to use them to identify themselves to other systems and to perform advanced functions like secure payments. The phone will finally begin to establish itself as the primary and secure way of authenticating users and proving identity.
  3. Lack of scalable identity proofing will continue to vex broader B2C/G2C deployments: The recent online user experiences as part of the Obamacare rollout demonstrated the logistical challenges of validating online identities in an accurate and scalable manner. As more and more users enroll in online services, demand for identity proofing services will increase significantly, but organizations will continue to experience identity proofing challenges. While the sources for identity proofing data will continue to expand with the digitization and exposure of new public and private records, this continued demand for identity proofing in 2014 will force the industry to collaborate and partner more closely to deliver scalable identity proofing to meet these needs.
  4. The CMO will become a new force for broad identity management initiatives: Successful marketing depends on understanding customers’ needs and providing them with a convenient experience for registration and enrollment. Allowing social login and maintaining a corporate presence on social networks provides an opportunity to capture valuable customer data, including user identities, social interaction patterns, and browsing and buying tendencies. The CMO will press for these capabilities to help the enterprise engage with its customers, develop a stronger relationship with them, and improve loyalty. Identity management infrastructures that support these marketing initiatives will experience improved demand as “business enablement” gains wider recognition as a critical driver of IAM.
  5. Risk-based authentication expands beyond Financial Services: While corporate desire for employee and customer mobile enablement is strong, security mechanisms that are cumbersome for consumers accustomed to instant access are met with resistance or all-out avoidance. The need for both stronger authentication and a positive user experience will lead to the widespread adoption of risk-based authentication, in which contextual data about users, devices, applications, locations and other potential risk factors are collected and analyzed to determine a risk-level for the user’s identity. Financial Services has been a leader in the adoption of risk-based authentication due to the high value of many customer transactions. But, this technology will begin to be more widely adopted across other industries as the need for improved security without impacting user convenience increases.

About CA Technologies

CA Technologies (NASDAQ:CA) provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data and identities, from the data center to the cloud. Learn more about CA Technologies at www.ca.com.

Follow CA Technologies

Social Media Page
Press Releases

Legal Notices

Copyright © 2014 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. 11749. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.

Add a Comment

News   More...

Start Premium Trial Register For Free

P F Fund Financial Data (13,000+ funds)
P F Stock Financial Data (7,000+ stocks)
P F Stock and Fund Screeners (basic)
P F Investing Articles and Market Commentary
P F Articles Archive (>30 days)
P F Discuss (dozens of stock, fund, bond, and general bulletin boards)
P F Portfolio Manager (basic)
P F Morningstar Investment Classroom
P F Access Your Portfolio Anytime, Anywhere via Your Mobile Device
P   Morningstar Fund Analyst Reports (full research on 1,700 funds, ETFs, and CEFs)
P   Morningstar Stock Analyst Reports (full research on more than 1,100 stocks)
P   Portfolio Manager (advanced with 10 X-Ray analyses, including recommendations)
P   Portfolio Monitor (monthly and on-demand personalized portfolio statements)
P   Morningstar Proprietary Stock Information (stock star ratings, buy/sell prices, economic moat ratings, and more)
P   Morningstar 5-Star Stock and Fund Favorites & Red Flags eNewsletters
P   Premium Stock and Fund Screeners (advanced with nearly infinite ways to find the best securities for you)
P   Discounts on Morningstar newsletters, books, seminars, and more

Sign-up to Morningstar

Basic Access

Articles and Videos
Morningstar video reports, articles, data, and tools. Dig into our lineup of e-newsletters and investing classroom courses outlining sensible strategies for maximizing your investments.
Morningstar Discuss
Follow the buzz on individual stocks or fund families. Plus, read the latest posts from Morningstar members and analysts.
Portfolio Manager
Track your investments and watch lists with our Portfolio Manager. Customize your view with our comprehensive stock, fund, and ETF data.

Access these features and more when you sign up for Free Membership.
Join Morningstar today. It's Free.

Unlimited Access

Analyst Research
Gather in-depth, actionable insight on over 3,700 stock and mutual funds covered by Morningstar analysts. View our mutual fund Analyst Reports favored by professionals, savvy experienced investors, and new investors researching options for retirement savings, college plans, or other investment needs.
Portfolio X-Ray®
Ensure your portfolio is positioned exactly how you want with Morningstar's X-Ray Interpreter and Stock Intersection tools. A Barron's "Best of the Web" award winner for five years running, X-Ray Interpreter goes under the hood of your portfolio to provide a useful allocation, sector, and geographic analysis. And you can discover how much of a stock you really own, individually and through mutual funds, with Stock Intersection.
Investment Picks
Find new 5-star stocks (greatly undervalued companies) to consider daily. Our 5-star stock rating is a proven winner, consistently beating benchmarks like the S&P 500. Plus, browse our Fund Analyst Picks and Stewardship Grades to find shareholder-friendly mutual funds that are poised for outperformance.
Portfolio Monitor
Get a clear view of your investments with personalized reports about your portfolio. Receive monthly statements and generate reports on-demand to help you stay on track to meet your investment goals.

Access these features and more when you sign up for Premium Membership.
Start your free 14-day trial today online
Your subscription may be tax deductible. Please contact your tax advisor.

Content Partners
Morningstar - - CA Technologies Predicts Key Trends for Identity and Access Management in 2014
Name |  Ticker |  Star Rating |  Market Cap |  Stock Type |  Sector |  Industry Star Rating |  Investment Style |  Total Assets |  Category |  Top Holdings |  Top Sectors |  Symbol |  Title Star Rating |  Category |  Total Assets |  Top Holdings |  Top Sectors |  Symbol |  Name Topic |  Sector |  Key Indicators |  User Interest |  Market Cap |  Industry Name |  Ticker |  Star Rating |  Market Cap |  Stock Type |  Sector |  Industry Star Rating |  Investment Style |  Total Assets |  Category |  Top Holdings |  Top Sectors |  Symbol / Ticker |  Title Star Rating |  Category |  Total Assets |  Symbol / Ticker |  Name Title |  Date |  Author |  Collection |  Popularity |  Interest Title |  Date |  Company |  Symbol |  Interest |  Popularity Title |  Date |  Company |  Symbol |  Interest |  Popularity Title |  Date |  Author |  Collection |  Interest |  Popularity

Previous: CA Technologies Positioned in Leaders Quadrant of Gartner Magic Quadrant for User Authentication  |  Next: CA Technologies Provides Same-Day Support for IBM z/OS 2.1