ForgeRock

ForgeRock enables millions of consumers to interact with organisations online, building secure relationships and enabling new digital offerings from any device or connected thing. Learn more

Securing the Identity of Things (IoT) for the Internet of Things

Find out about the new ways that the IoT is processed, managed, protected, stored, and communicated

Marketers looking to harness the Internet of Things (IoT) require a new approach to viewing and implementing processing, analytics, storage, and communications. Certainly, identifying “who’s who, what’s what, and who gets access to what” is one aspect. But how this is processed, managed, protected, stored, and communicated is a whole new kettle of fish for businesses.

Identity management is not just about securing IoT devices; it must rationally secure and make sense of the entire environment, from customers to partners, websites to webpages, to mobile devices, apps, and the cloud. This is by no means a comprehensive list – just one that will hopefully give you an idea of the number of links in the chain.

Back in an age where companies only connected computers to other trusted computers, life was far simpler. Legacy systems were created to maximise internal security, keeping threats well outside. Security was perimeter-based. Firewalls protected organisations. Identity was about internal stakeholders, creating identities for employees to access the right information and services securely. Businesses used to have to cope with, on average, 20-40,000 identities.

However, the dawning of the IoT has turned this on its head. Marketing organisations everywhere need systems that provide secure access externally, to customers, partners, and other important stakeholders. This means systems have to cope with millions of identities, and most of them outside of the firewall. Static and portable devices need to talk to each other, and then there’s Human-to-Machine and Machine-to-Machine identification and interaction on top of that.

Customers need to access company systems via multiple devices or objects and expect a bespoke user experience based on how, when, and where they access services. This requires a single, secure identity platform to unify the entire company ecosystem and enable a straightforward, repeatable way of securing an increasing number of devices. Building a platform that supports and unifies the entire ecosystem is challenging enough, but organisations also need to be able to support new services, new devices, and new infrastructure on the back end.

So how do businesses protect data they can’t see as it’s communicated between machines and other parts of the ecosystem?

Contextual Knowledge is Power

Contextual intelligence and awareness can add significant value to digital services. For instance, a connected car can remember the personal preferences of every driver, or the Sony Smart B Trainer can offer personalisation to support the user’s individual fitness goals. The new data propagated by such devices enables companies to better understand their customers, as well as protect them. Devices come to know what to expect from you as a typical user—and notice abnormal behaviour that triggers enhanced security measures. This kind of contextual intelligence also opens up revenue opportunities for cross-selling, upselling, and delivering personalised services.

Encrypting and authenticating this data is essential; however, it is also imperative to understand who accesses data and how, as well as where and when they access it. Knowing this information will help authenticate the user and confirm that their behaviour is in-line with past behaviour. It is important to note that as these kinds of IoT devices continue to come online, organizations need to be sensitive to the highly personal nature of the data that can be collected. Obtaining the consent of the user to act on this data is critical.

Real-time contextual clues, in addition to credentials, provide organisations with the tools needed to decide whether to grant access, and how much access to allow. For instance, if a system detects a login attempt with correct credentials, but from an unrecognised IP address or at an uncharacteristic time of day, it can activate additional security measures such as requesting personal security questions or sending verification codes to a user’s mobile phone.

The speed at which marketing organisations get to reap the rewards of IoT lies firmly in their hands. The Internet of Things requires oganisations to understand and manage an external-facing identity management platform effectively. Unless organisations can link objects, devices, and new mobile and social apps to a single security platform, they won’t be able to truly harness the enormous growth potential offered by IoT.


Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Show Comments

Blog Posts

Data has the power to build or burn brands

A brand can be severely wounded by use or misuse of any of its assets and you could say data has the greatest power of all to inflict damage.

Lucy Acheson

Head of data strategy and customer experience, LIDA

Totto and your inorganic future

At Cannes Lions this year we’ve been treated to many artificial intelligence (AI) insights. It’s one of the major discourses of our time.

Richard Brett

CEO, opr

Personas of one and the rise of ‘always there’ marketing

I’ve got some bad news. The ‘always on’ marketing approach that many companies have only just fully implemented is already out of date.

Nigel Roberts

Founding partner and strategy lead, Yell

The best design always features a minimalist approach to the use of color. Many designers are tempted to use many different colors but us...

Jose Salas

How email marketing automation is helping this Aussie electrical wholesaler enter the digital age

Read more

I read you post full. It's really good .

Yusuf

Salesforce ups the Marketing Cloud ante with Datorama acquisition

Read more

Promotion is difficult. You should be able to do it. Sometimes it turns out bad, and when you turn to professionals, it turns out well - ...

Jordan Samuil

Village Roadshow partners with Lion for pourage rights and promotional partnership

Read more

This is very good news for Australian SMEs as ActiveCampaign is an very powerful marketing automation / email marketing tool that costs a...

Lawrence

SMB marketing automation provider sets up Asia Pac HQ in Sydney

Read more

Completely agree! For the best commercial properties in Mumbai, visit our website - Jagaha!

Gizelle

Salesforce ups the Marketing Cloud ante with Datorama acquisition

Read more

Latest Podcast

More podcasts

Sign in