Who will have access to what and when? In a complex world where everyone and everything – people, things and services - will be connected everywhere and anytime through a global cloud, IAM is going to remain one of the strongest means to protect enterprise and user security. Especially when firewalls as security perimeters are not sufficient anymore. To take over the leading protection task, however, IAM technology has to change fundamentally.
Particularly with the digital transformation of businesses, IAM moves into the center of operations. The mere defining of roles for individual access permissions is therefore no longer enough. IAM has to become more agile and fine-grained. It has to allow for decisions about the access of customers/consumers, employees, partners and billions of things/devices dynamically and in real time. In addition, plenty of users will use different identities (or personas) and switch between them several times a day or even hour, often by deploying different authentication mechanisms.