{"id":1225,"date":"2016-02-23T10:58:29","date_gmt":"2016-02-23T08:58:29","guid":{"rendered":"http:\/\/www.identitycosmos.com\/?p=1225"},"modified":"2016-02-23T10:58:29","modified_gmt":"2016-02-23T08:58:29","slug":"les-predictions-de-ca-technologies-en-ce-qui-concerne-liam-en-2016","status":"publish","type":"post","link":"https:\/\/identitycosmos.com\/index.php\/2016\/02\/23\/les-predictions-de-ca-technologies-en-ce-qui-concerne-liam-en-2016\/","title":{"rendered":"Les pr\u00e9dictions de CA Technologies en ce qui concerne l&#8217;IAM en 2016"},"content":{"rendered":"<p>Comme tous les ans, les experts de CA technologies fournissent leurs pr\u00e9dictions sur la march\u00e9 IAM. Force est de constater que leur pr\u00e9diction 2015 n&#8217;\u00e9taient pas si mauvaises, donc il semble int\u00e9ressant de de regarder attentivement les pr\u00e9dictions 2016&#8230;<\/p>\n<p>Le WebCast proposant les pr\u00e9dictions 2016 est accessible ici:\u00a0<a href=\"https:\/\/www.brighttalk.com\/webcast\/7845\/171013\/ca-briefings-part-5-the-rise-of-the-user-security-predictions-for-2016\">https:\/\/www.brighttalk.com\/webcast\/7845\/171013\/ca-briefings-part-5-the-rise-of-the-user-security-predictions-for-2016<\/a><\/p>\n<p>Le blog de CA Technologies propose un condens\u00e9 de cette pr\u00e9sentation en quelques paragraphes: [ source:\u00a0https:\/\/blogs.ca.com\/2016\/01\/05\/five-identity-centric-security-predictions-for-2016\/ ]<\/p>\n<h2><em><strong>What\u2019s ahead in 2016<\/strong><\/em><\/h2>\n<p><em>For 2016, CA Technologies predicts the following five trends will emerge and have the greatest impact on security professionals dealing in identity this year.<\/em><\/p>\n<ul>\n<li><em>Identity services will be used by increasing numbers of business users, as the function moves from IT to the Business.\u00a0 This will require improvements in the user experience so that it is more intuitive and business-oriented. This will begin to result in improved engagement with customers and business users, as well as reduced risk.<\/em><\/li>\n<li><em>Breach attack surfaces increase and the ramifications of a successful breach extend beyond financial loss. Increased reliance on DevOps\/Agile development and virtual\/cloud technologies opens new attack vectors, while cybercrime shifts to cyberespionage, threatening homeland security and opening the potential for cyberterrorism attempts.<\/em><\/li>\n<li><em>Risk analytics moves from financial sector to the enterprise. As enterprises struggle to identify consumers from identity thieves using just a password for authentication, they will turn to risk-based analytics to protect their Internet sites and mobile applications.<\/em><\/li>\n<li><em>As identity and access security and management (IAM) become more strategic to the business, there will be an increase in demand for IAM expertise in 2016. A greater focus on privileged identities, identities extending to the cloud, and third-party identities incorporated into the security framework makes the security challenge around identities more complex.<\/em><\/li>\n<li><em>As the Internet of Things permeates the marketplace, it is increasingly clear it must become identity-centric. IoT will also stand for \u201cidentity\u201d of things. As information passes across the internet and is stored on these IoT devices, they need to be confirmed and trusted just as a person\u2019s identity needs authenticating.<\/em><\/li>\n<\/ul>\n<p>Les points 3 et 4 sont pour moi tr\u00e8s importants. M\u00eame si il s&#8217;agit d&#8217;un &#8220;vendor&#8221;, le Webcast est extr\u00eamement int\u00e9ressant \u00e0 regarder pour des sp\u00e9cialistes IAM qui veulent aller plus loin que la simple partie technique et qu&#8217;ils veulent comprendre un certain nombre d&#8217;enjeux business li\u00e9s \u00e0 l&#8217;IAM.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Comme tous les ans, les experts de CA technologies fournissent leurs pr\u00e9dictions sur la march\u00e9 IAM. Force est de constater que leur pr\u00e9diction 2015 n&#8217;\u00e9taient pas si mauvaises, donc il semble int\u00e9ressant de de regarder attentivement les pr\u00e9dictions 2016&#8230;<\/p>\n<p>Le WebCast proposant les pr\u00e9dictions 2016 est accessible ici:\u00a0https:\/\/www.brighttalk.com\/webcast\/7845\/171013\/ca-briefings-part-5-the-rise-of-the-user-security-predictions-for-2016<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[58,115],"class_list":["post-1225","post","type-post","status-publish","format-standard","hentry","category-strategie","tag-ca","tag-iam"],"_links":{"self":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/1225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/comments?post=1225"}],"version-history":[{"count":0,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/1225\/revisions"}],"wp:attachment":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/media?parent=1225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/categories?post=1225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/tags?post=1225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}