IT and Business Insights for SMB Solution Providers

The Identity of Things

Billions of connected devices require an automated system to manage access, operations, and security. By Samuel Greengard
Reader ROI: 
AUTOMATION of authentication and access management for IoT connected devices is critical.
THE IDENTITY OF THINGS uses metadata to track, manage, and secure objects within the IoT.
START WITH AN UNDERSTANDING of your customer’s vertical, the business processes, and the relationships of objects to individuals

AS THE INTERNET OF THINGS (IoT) moves into the mainstream of business, managing and authorizing systems is critical—and a formidable challenge. Enter the Identity of Things.

“In order to use the IoT and today’s digital frameworks effectively, you have to understand what’s in place and how things are connected and interconnected,” says Barika Pace, research director at Gartner.

The Identity of Things takes aim at this challenge by using metadata—typically associated with a unique identifier—to track and manage IoT components. The concept is especially important as organizations adopt solutions that create an ecosystem of sensors, devices, and users. “Without a framework in place to manage connected devices, things can become completely unmanageable,” says Jim Kaskade, CEO of digital identity firm Jainrain Inc., in Portland, Ore.

While there’s no single approach for handling access management and security for connected devices, the Identify of Things offers a way to automate and improve business and IT processes.

Identities Matter

The ubiquity of IoT devices is a big part of what makes them so hard to manage. Gartner predicts that more than 21 billion connected devices will be in use by 2020. As organizations look to extract maximum ROI from billions of systems, it’s critical to ensure that they are operating effectively—and securely. All of this must take place automatically and invisibly; an identity management framework, the Identify of Things essentially serves as the traffic cop.

The Identify of Things uses unique identifiers (UIDs) and associated metadata to establish and maintain seamless communication between devices and across a system. Moreover, as smart cities, supply chains, and other complex ecosystems take shape, the need for a device management framework grows exponentially. “You cannot have passwords associated with every sensor or device, and you cannot manually check every system to ensure that it’s working as billed,” Kaskade stresses.

An Identity of Things system can reside on premises or in the cloud, and it can involve different tools and resources from one or more vendors. The common denominator is that an Identity of Things framework requires some type of application or database to oversee a collection of connected devices. “It’s essential to identify devices, authenticate them, and patch [them] over the open air,” Pace explains.

About the Author

Samuel Greengard's picture

Samuel Greengard is a freelance contributor who specializes in business and technology writing.

ChannelPro SMB Magazine

Get an edge on the competition

With each issue packed full of powerful news, reviews, analysis, and advice targeting IT channel professionals, ChannelPro-SMB will help you cultivate your SMB customers and run your business more profitably.