Sign in to search Gartner Research
Analysts Explore Changing Attitudes to Social Media at the Gartner Identity & Access Management Summit 2012, March 12-13, London
Fewer than 30 percent of large organizations will block employee access to social media sites by 2014, compared with 50 percent in 2010, according to Gartner, Inc. The number of organizations blocking access to all social media is dropping by around 10 percent a year.
"Even in those organizations that block all access to social media, blocks tend not to be complete," said Andrew Walls, research vice president at Gartner. "Certain departments and processes, such as marketing, require access to external social media, and employees can circumvent blocks by using personal devices such as smartphones. Organizations need now to turn their attention to the impacts of social media on identity and access management (IAM)."
Gartner said that social media environments include mechanisms to collect, process, share and store a more complete range of identity data than do corporate IAM systems. They enable a more complete view of identity, one that extends beyond the bounds of organizations. For IAM managers, this is both a threat and an opportunity. Identity data and social media platforms can expose organizations and users to a wide variety of security threats, but organizations can also use this identity data to improve support for their own IAM practices and the ambitions of business stakeholders.
Gartner identified three significant impacts of social media on IAM:
Personal trust misaligned with corporate trust: Employees who participate in online social media continually make judgments about the degree of trust they should place in the platforms and in other participants, and they adjust content, structure and vocabulary to match their risk assessments. These assessments and the fundamental inputs to their assessment process may not align with corporate expectations for risk management. As a result, employees may say and do things on social media platforms that violate corporate policy or are otherwise counter to corporate expectations.
Public content supports identity intelligence: The collection of identity data by public social media on a massive scale enables improvements in the production of identity intelligence. This pushes IAM programs to discover the user profiles accessed by staff and to maintain capabilities for accessing external services in order to harvest identity data.
Identity data can be leveraged for IAM: Social media provide a mechanism for verifying the identity of employees, job candidates and customers, and a cloud identity platform for performing IAM for other applications. IAM programs can use social media for identity verification and to extend identity services to internal and external applications via a semi-trusted social platform.
"Organizations should not ignore social media and social identity," said Mr. Walls. "We recommend that organizations ascertain how they currently use internal and external social media in both official and unofficial ways, and look for dissonance between IAM practices and the identity needs, opportunities and risks of social media."
Mr. Walls will speak on the impact of social media on IAM at the Gartner Identity & Access Management Summit 2012. For further information on the Summit, which will take place on March 12-13 in London, please visit www.gartner.com/eu/iam. Additional information from the event will be shared on Twitter at http://twitter.com/Gartner_inc and using #GartnerIAM. Members of the media can register by contacting Laurence Goasduff at firstname.lastname@example.org.
About Gartner Identity & Access Management Summit 2012
The Gartner Identity & Access Management Summit 2012 will explore the future of IAM technologies and the changing market landscape. It will help organisations promote desirable business outcomes, improve identity-relevant service levels, and satisfy growing regulatory and compliance imperatives.
Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. Gartner delivers the technology-related insight necessary for its clients to make the right decisions, every day. From CIOs and senior IT leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to technology investors, Gartner is the valuable partner in over 13,000 distinct organizations. Through the resources of Gartner Research, Gartner Executive Programs, Gartner Consulting and Gartner Events, Gartner works with every client to research, analyze and interpret the business of IT within the context of their individual role. Founded in 1979, Gartner is headquartered in Stamford, Connecticut, U.S.A., and has 5,500 associates, including 1,400 research analysts and consultants, and clients in 85 countries. For more information, visit www.gartner.com.
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.