FB pixel

Enterprises must revamp IAM for comprehensive security

Omdia report finds finds attackers outflanking static IDV
Categories Access Control  |  Biometrics News
Enterprises must revamp IAM for comprehensive security
 

Traditional IAM approaches are falling short as attackers exploit stolen credentials across customer, workforce and third-party environments, according to a new white paper from technology research and advisory group Omdia, commissioned by identity verification and fraud prevention platform ID Dataweb.

According to the paper, enterprises should overhaul their approach to identity security, warning that conventional identity and access management frameworks can no longer keep pace with modern credential-based threats.

The firm’s new white paper, “Controlling Identity Risk: Detecting and Mitigating Identity Threats,” examines how attackers exploit weak, stolen, or compromised credentials across customer, workforce, and third-party environments such as contractors and suppliers.

Effective identity threat detection, the report argues, must go beyond verifying individual login events. Instead, it should analyze transaction patterns across credentials, incorporate adaptive identity verification, behavioral analytics, device and credential intelligence, and apply real-time risk scoring.

Omdia also warns against fragmented security strategies that are optimized for individual teams but leave the broader enterprise exposed. Adequate solutions, the report states, must offer flexible risk detection and orchestration, broad access to authoritative identity data sources, resilience across infrastructure and verification services, and privacy preservation.

The goal is a single integrated solution that works across all enterprise identity use cases while reducing complexity and cost.

Dave Coxe, co-founder and CEO of ID Dataweb said the problem spans the entire digital identity lifecycle.

“Organizations need a unified approach that can continuously verify the person behind the credential across the full identity lifecycle without adding friction for legitimate users,” he says.

New research this week also shows many enterprises are way behind on IAM, and continuing to rely on passwords.

Related Posts

Article Topics

 |   |   |   | 

Latest Biometrics News

 

White House fraud crackdown sharpens focus on digital identity

The Trump administration’s March 6 Executive Order 14390, aimed at combating cybercrime and fraud, has prompted a significant response from…

 

Gender gaps threaten progress on global legal identity goals, Vital Strategies CEO warns

As countries work toward universal legal identity under SDG 16.9, greater focus on gender inclusion is needed to ensure women and…

 

Guyana data chief says digital ID won’t replace voter ID

Guyana’s Data Protection Commissioner, Aneal Giddings, has clarified that the country’s national digital ID is not intended to be used…

 

Biometrics at scale: EES setbacks meet growth push

The effectiveness of biometrics deployments at scale can be prone to failures of procedure or coordination, as travelers to Europe…

 

Concordium’s Boris Bohrer-Bilowitzki wants to keep your AI agents in line

“Without identity, autonomous action is just autonomous risk.” So says Boris Bohrer-Bilowitzki, CEO of Layer-1 blockchain protocol Concordium. Concordium has…

 

Veratad among first certified to ISO 27566 age assurance standard

Veratad is one of the first companies worldwide to achieve certification to ISO/IEC 27566‑1:2025, the newly established international standard for…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events