in ,

Steve Firestone: Data Breaches, Mobile Apps Demand to Influence Firms’ ID Mgmt Strategies

Steve Firestone: Data Breaches, Mobile Apps Demand to Influence Firms' ID Mgmt Strategies - top government contractors - best government contracting event

CyberStockCA Technologies has highlighted five trends that the company believes will shape security professionals’ approach to identity and access management in 2015.

The company forecasts that organizations will move away from basic identity administration methods and emphasize identity security as a result of massive enterprise data breaches last year, CA said Wednesday.

“The impact of data breaches in 2014, coupled with the demands of the application economy, will greatly influence the way security professionals view and approach identity and access management in 2015,” said Steve Firestone, senior vice president and general manager for CA’s security business.

CA also predicts more enterprises will use mobile devices as a universal authentication tool and that demand for authenticators will driven by biometrics, payment models and chip-and-pin technology.

Internet of Things and mobile applications are also projected to influence the emergence of application programming interface-first architectures that are designed to help users connect to a digital ecosystem, according to CA.

The software firm also forecasts that corporate executives and board of directors will increase their involvement in their organizations’ security governance and strategy development

ExecutiveBiz Logo

Sign Up Now! ExecutiveBiz provides you with Daily Updates and News Briefings about Cybersecurity

Executive Profile: Terence Raley, AECOM Govt Services Group VP of Contracts and Procurement - top government contractors - best government contracting event

Executive Profile: Terence Raley, AECOM Govt Services Group VP of Contracts and Procurement

Navy OKs More Raytheon SM-6 Weapons for Aegis Systems - top government contractors - best government contracting event

Navy OKs More Raytheon SM-6 Weapons for Aegis Systems