Businesses around the world are adopting service automation tools and processes. But how can end users adapt to the system?

According to data experts, IT security specialists are turning to ecosystems, networks and partnerships, rather than rely on individual users to maintain their computer system’s defences.

CW500 panellist Simon Gratton, chief data officer at Zurich Insurance Company, believes there is a need to monitor machines which control IT security as it’s “no longer just about an individual with a logon ID on a Windows network”.

He maintains the time has come to create mechanisms to develop identity containers for people and machines, as simply identifying an individual in the context of the interaction taking place is proving increasingly difficult.

According to Gratton, identity access management is about identifying an individual. He’s also forecast the age of identity relationship management is almost upon us, which, in a nutshell, means identifying a relationship with something.

Amid the bold prediction, comes a note of caution. Gratton warns identity relationship management requires a whole set of different qualities, insisting the relationship between the interaction of people and things requires an understanding of ontologies, semantics and learning algorithms. He suggests IT experts hold the whip hand in this instance and the onus was on the industry to teach devices to understand these relationships.

It would be safe to say connecting more things to the home network creates greater risk of intruders breaking in. Cliff Saran of said businesses are also at risk, given that many people use a VPN to bridge their home network to the corporate network. Whilst security is evolving, the market in IoT security is still immature, and there is a distinct lack of standards, he argues.

Elsewhere, it’s been advocated that the government gets involved in mandating service automation standards, especially in things such as driverless cars where the dangers associated with remote hacking are obvious.

Ultimately, the biggest issue facing security experts is the potential for IoT devices to generate too much data to process, leaving them searching for a rogue needle in a giant, virtual reality haystack.

So unless there is a sudden, very unlikely regression in IoT capability, the race is on to control service automation – before it controls us.

Related Posts

Leave a comment