ForgeRock
IoT in desperate need of more robust identity and access management
The future of Identity and Access Management (IAM) in the Internet of Things (IoT) will escape the confines of user-focused identity and transition toward a more inclusive model. The new multi-faced approach will include machine and system identity along with IoT device and platform management operations, according to a new analysis research report by global tech market advisory
Read moreBuild digital trust to unleash the full commercial potential of IoT
The API revolution is fuelling digital transformation across a spectrum of industries and opening the way for new IoT use cases. But capturing the full commercial potential of the IoT will depend on addressing lingering consumer concerns over consent and privacy, explains Eve Maler
Read moreWill the Internet of Things kill off passwords?
The tech goliaths Google, Apple and Facebook are all starting to take steps towards killing off password authentication once and for all. They see the opportunity to shore up security while also cutting down the number of password resets that consumers have to deal with.
Read moreIs the Internet of Things broken beyond repair?
The Internet of Things has come a long way in the five years since the first IoT Day in 2011. But, there is a darker side to its success, with thousands of high-profile hacks having been carried out on connected devices.
Read moreHow to provide continuous security and protect our privacy online
In this exclusive interview with ForgeRock, VP of Emerging Technology, Eve Maler tells IoT Now what organisations can do to better protect customer information online.
Read moreForgeRock Identity Platform addresses evolving customer data privacy regulations with ‘first-of-its-kind’ consent solution
ForgeRock® has introduced its newest identity management platform, including an implementation of the User-Managed Access (UMA) standard. Built on consent-by-default and consent-by-design principles, the ForgeRock Identity Platform™ is the first identity management platform to support an UMA implementation designed for consumer consent and data sharing purposes.
Read moreOpen source: Security through transparency
The contrast between proprietary and open source software is as old as the IT industry itself. Software in almost every category is available either from suppliers who develop and market their code by themselves or from developer communities who work with open code.
Read moreSecuring the IoT: Is it possible to protect billions of devices simultaneously?
To understand why there is so much excitement surrounding the Internet of Things (IoT), look no further than smart home appliances.
Read moreFuture smart ‘things’ to be co-operative, emotional and lucrative, say CW speakers
The process of providing connectivity and functionality to ‘things’ no longer represents a challenge in the modern digital era.
Read moreSecuring the smart city
As the vision of smart cities increasingly becomes reality, so too does the issue of security surrounding them. What can be done to ensure the security practices put in place are up to the job?
Read moreBalancing act: Why embracing the IoT doesn’t mean the end of privacy
Recent technological advances have paved the way for an era of almost limitless imagination in the way we live our lives. The Internet of Things (IoT) is the embodiment of this phenomenon.
Read moreSecuring the Identity of Things (IDoT) for the Internet of Things
In its recent report, The Identity of Things (IDoT) for the Internet of Things, Gartner lays out how it believes the Internet of Things (IoT), or what is often now referred to as the Internet of Everything (IoE), cannot and will not prosper unless organisations knuckle down and come to grips with how to manage
Read more