Top 3 IAM Trends to Watch for in 2018

December 8th, 2017   |     |  security & compliance

Every year, identity and access management experts from across the country convene at Gartner’s North America IAM Summit to discuss the hottest trends and developments in IAM strategy. While attending the event in Las Vegas last week, I noticed there were a handful of key topics that were generating buzz throughout the event.

Here are the top three hottest topics covered at the Gartner IAM Summit 2017:

1. Organizations are expecting more from MFA

Multi-factor authentication was one of the most hotly-discussed topics at the conference. Most everyone acknowledges a need for MFA, but feel that their current MFA solutions aren’t keeping up with cyber threats.

According to the Ponemon Institute (via IBM), the average total cost of a data breach is $3.72M. And according to the 2017 Verizon Data Breach Investigations Report (DBIR), over 90% of breaches involve some sort of phishing. But most MFA solutions are not adept at protecting against these attacks.

At the OneLogin booth, there was a lot of buzz around Adaptive Authentication: the next-generation of MFA which utilizes machine learning to calculate risk scores, and determine an appropriate security action.

In fact, Gregg Kreizman, VP of Research at Gartner, listed Adaptive Authentication as the number one priority on his list of Management Trends for 2018.

In short, Adaptive Auth uses login information like time of login, geographic location, browser, device, and network reputation to determine how secure a login attempt is. If a login attempt seems suspicious, the system will automatically prompt the user with an MFA request before they can proceed.

2. IT is seeking smarter Web Access Management

Kreizman also highlighted Web Access Management (WAM) on his Management Trends list. We all know that organizations are looking to leverage cloud resources for better productivity and efficiency; But as organizations embrace the cloud, they are left wondering how to support the on prem applications they still depend on.

It was especially exciting to see the turnout for the theatre session breaking down the WAM landscape, presented by our very own Corporate Sales Engineering Manager, Khizar.

To summarize Khizar’s points, OneLogin Web Access Management (WAM) integrates with an organization’s web servers to secure access to legacy applications, while also connecting to the OneLogin Cloud Directory for the full set of Cloud IAM features. Users are able to view both on-prem and SaaS apps all on the same single sign-on portal, while also making those on-prem apps more secure.

3. GDPR is Top-of-Mind

May 2018 is almost here, so of course GDPR (General Data Protection Regulation) was a hot topic of discussion. For those who don’t know, GDPR is a regulation intended to strengthen and unify data protection within the European Union (EU) that will go into effect in May of 2018.

This regulation will impact organizations across the globe - especially those who handle the data of companies within the EU.

For those looking to learn more about how to become compliant, please set up a call with us to understand how OneLogin can help. We have a number of relevant reources to offer, such as Customizable Terms & Conditions to satisfy the Explicit Consent requirement that is part of GDPR. Check out our GDPR compliance page or the resources on our compliance initiatives page to understand OneLogin’s Compliance Standards.

Thank everyone who visited our booth and our theatre presentation. We hope to see you next year at Gartner IAM 2018.

In the meantime, we’d love to hear from you! Click the button below to learn more about OneLogin WAM, Adaptive Auth, or how we are preparing for GDPR.

About the Author

David Dolnick is OneLogin’s marketing events manager and is responsible for all North American event marketing. David was a OneLogin customer before he joined the team and loved the product so much he jumped on board. David has been in the events industry for 17 years and has a passion for face-to-face lead generation.

View all posts by David Dolnick

Secure All Your Apps, Users, and Devices