6 tech trends that will have a major impact this year

by bold-lichterman

The tech industry is constantly evolving, which makes it exciting especially for people who closely follow the latest innovations. In 2016, what will be the trends that should emerge? Here are six predictions for security, big data, and the Internet of Things (IoT) that will have a major impact on the tech landscape over the next twelve months.

The death of the password is fast approaching

This year’s news involving Amazon shows why password death has been hitting everyone’s mind recently. The approach to safety of only evaluating the risks, when someone is already at your door, can no longer walk. When you continuously analyze someone’s authenticity while they are already in your system, then you can provide an environment with high security, while ensuring ease of use for the end user.

As the Internet of Things brings billions of new devices, services and applications online, the ability to continuously monitor and authenticate users while they use a company’s services will become a real benefit. commercial. It is necessary to use an identity management platform that enforces contextual identity, adaptive risk, and multi-factor authentication during authentication, but also at all times during a session. This kind of continuous security approach will be widely adopted in the market and become the new standard, as it guarantees the authenticity of users, devices, objects and services at all times and can reduce the risks when detecting an anomaly, even during existing sessions.

Security protection chip-to-cloud (or equipment to cloud) will be the new standard

As enterprise technologies advance, the chain of data security continues to expand, presenting an increasing number of opportunities for hackers. Most data chains now span the spectrum from chips to cloud, hardware and network (and all the other steps in between), and many organizations are starting to realize that an approach fragmented protection is simply not effective. This encourages the adoption of more “chip-to-cloud” security strategies.

In this model, all objects that can be connected are secure from the moment they arrive online, which means that their identity is immediately authenticated. In doing so, the approach eliminates any opportunities for hackers to impersonate unsecured objects, thereby compromising the entire data chain through a single point of entry.

New technologies and standards enabling consumer security and privacy will become a competitive differentiator

Smart and connected objects are coming online at a rapid pace and more users want to take advantage of services that will make their lives easier. But not at the cost of their privacy and security. Successful organizations know they need to build customer trust to generate new opportunities by empowering users to merge data to create value with up-to-the-minute accurate data flows, especially in health, smart home, geolocation and other sources.

They’re thinking about how to build delegation and consent capabilities fast enough to satisfy their customers, businesses, and the ever-changing regulatory landscape. And they know they need to do it all with an architecture that scales to support millions of consumers and employees who can manage their own permissions. User Managed Access (UMA) makes it all possible. This new standard is now becoming available and those who adopt it early will be able to build a much stronger relationship with their customers, based on trust and mutual benefit.

The evolution of the Internet of Things will change our interactions with the world around us

The Internet of Things (IoT) continues to accelerate, but to date, the majority of IoT applications are more “bonus” than business critical. But this is about to change. With the evolution of technologies, contextual Big Data takes on its full meaning and companies and administrations will be able to use the IoT to fundamentally change our daily lives. At the center of it all is the increasingly intertwined relationship between people, “things” and applications.

This means that things like medical devices, thermostats, security cameras, and vehicles are able to directly receive a constant stream of personalized information. These objects can also act on information immediately using bespoke applications and services, if necessary. The key elements of the smart city concept are the ability to use sensors connected to traffic lights to unblock traffic jams or to use earthquake monitoring to shut down gas pipes or other critical infrastructure that could be damaged by an earthquake. Securing these systems will be critical for public safety, and digital identity will be the critical layer of security in building smart cities.

Data source tagging will multiply the value of big data exponentially

The concept of Big Data has been around for several years now, but most companies still struggle to extract any value from the data they collect. This is usually because they look at the data in isolation, which in itself makes little sense. For big data to make sense, it needs to be seen in the context in which it was collected. By labeling the data at the point of collection with additional contextual information, the value that can be extracted from it across an organization is greatly multiplied. Key factors like where and when data is collected, or who or what it comes from, are essential to a better understanding of data. The data points of consent, context, identity, and security will all dramatically improve the value of big data.

The fight to become the “Amazon of IoT” will intensify

Amazon’s disruptive “one-stop shop” approach to online shopping has allowed it to quickly become a dominant force in the retail industry. As the vast potential of IoT becomes clearer, we’ll begin to see a growing number of organizations struggling to establish themselves as the leading provider of IoT solutions, the Amazon of IoT. This will drive the development of the IoT mega-platform: huge platform solutions as a one-stop-shop service. The fight will certainly take place in all the markets of individuals and professionals, and many of the usual players are already coming to the fore. Apple, Google and Intel all vie for control of our homes, while Microsoft, IBM and Oracle fight for our businesses, but this setup could give way to an innovative disruptor that takes everyone by surprise. After all, no one had heard of Amazon 20 years ago.

Lasse-Andresen-ForgeRockLasse Andresen is Director of Technology at ForgeRock. His more than 20 years of experience in the software industry include leadership roles at Sun Microsystems – where he was CTO for Northern and Central Europe – and Texas Instruments. He was also the co-founder and CTO of Gravityrock.