by Mark Diodati | November 2, 2017 | Comments Off on New Research: IoT Platforms, Devices and Identity Management
New Research: IoT Platforms, Devices and Identity Management
Gartner just published my latest research note. It focuses on the intersection of the IoT platform and identity management—for both devices and users. This note attempts to answer some popular questions from our clients, including:
- How do I establish and maintain device trustworthiness? Before you can rely upon the data generated by the device, you must be able to trust it.
- What are the core capabilities I should look for in an IoT platform? What capabilities will I need in the future?
- How can I counteract the risks of connecting to devices and gateways that I don’t own manage?
- How do I limit the exposure associated with intelligent, API-driven devices?
Identity management capabilities for seven of the most popular IoT platforms are assessed:
- AWS IoT
- Bosch IoT Suite
- GE Predix
- IBM Watson IoT Platform
- Microsoft Azure IoT Suite
- Oracle IoT Cloud Service
- PTC ThingWorx Platform
The note compares the platforms across many capabilities, including:
- Supported IoT protocols
- Device and user authentication, including device certificate management, OAuth, OpenID Connect and SAML support
- Application (API-level) authentication for platform management and orchestration.
- Access control for devices and users
- Device and user lifecycle management
If the topic interests you, I’d love to hear your feedback on the research note.
Key IAM Considerations for IoT Platforms (Gartner subscription required)
Read Complimentary Relevant Research
How to Evaluate Cloud Service Provider Security
Security and risk management leaders continue to experience challenges to efficiently and reliably determine whether cloud service providers...
View Relevant Webinars
Managing the Security Risks of IoT Innovation
While IoT provides a revolutionary approach to technology innovation for digital business, with great change comes great responsibility....
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.