Identity for the Internet of Things

Smart City. Smart Car. Connected Home. Digital Health.

Securing the IoT Requires Digital Identity

There are a lot of exciting new devices, services, and connected things coming online. Awesome, but don’t forget: the digital identity of things is key to securing the Internet of Things. No one wants their connected car (let alone their smart fridge) getting hacked! Leading organizations choose ForgeRock to provide digital identity for the IoT, whenever and wherever they need to connect users, devices, and things – whether it’s customer facing, device-friendly, citizen, employee or patient solutions. 

6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020 (Gartner)

In this video, learn how ForgeRock makes it easy to connect and build innovative new IoT products and services

Secure IoT with digital identity

Manage Millions (of Identities) 

With over 20 billion connected devices expected to be online by 2020, IoT is a critical component of digital business. This requires an identity solution that can connect with anything and support IoT ecosystems, users, services, and their relationships.

  • Manage the digital identities of connected devices and things like cars, drones, wearables, and whatever’s coming next
  • Simplify complex identity relationships with built-in data visualization tools
  • Support hundreds of millions of devices and things at IoT scale

Identity of Things

The IoT is a revolutionary opportunity for organizations to engage customers in new, personalized ways, to extend reach beyond traditional channels, and to introduce features that disrupt legacy business. An IoT-ready identity platform can help you:

  • Unify multiple identity stores and use identity attributes and context to create a single customer profile that helps to drive personalization, upsell, and cross-sell
in the Internet of Things, identity is key
TomTom has initiated a program for delivering a new identity platform that manages identities of customers and devices worldwide at very large scale. The identity platform is a global solution. It is a great example of a way to manage all identities ─ of peoples, devices, and things ─ in a consistent way.”

KuppingerCole awarded TomTom the Best Consumer Identity Project 2016 for unifying their digital ecosystem

Learn more about the TomTom Connected Car deployment 

Internet of Things Security

Connected devices have often found themselves in the news for all the wrong reasons. Cars, homes, and medical devices have all fallen prey to opportunistic hackers who exploit the lack of secure digital identity for the Internet of Things. The frequency and severity of IoT hacks and breaches highlights the need to protect connected devices.  

  • Protect your digital infrastructure with a proven identity platform that can orchestrate and process workflows to securely on-board IoT
  • Easily revoke the identity of a device if it is sold, stolen or lost
  • Monitor connected devices throughout a digital session, not just at initial authentication and apply contextual identity, adaptive risk and multi-factor authentication as needed
  • Enable human to device as well as device to device authentication and authorization
The [Dyn DDoS] attack appears to have relied on hundreds of thousands of internet-connected devices like cameras, baby monitors and home routers that have been infected — without their owners’ knowledge — with software that allows hackers to command them to flood a target with overwhelming traffic….And the assault…is only a glimpse of how those devices can be used for online attacks.”

Nicole Perlroth, technology security reporter, The New York Times


Protect Data Privacy  

IoT devices generate massive volumes of highly valuable data. However, before this data can be used for personalization and other initiatives, customers must consent to sharing it. Organizations that give their customers the ability to manage how their personal data is used will be market leaders in the IoT era.

  • Give users the ability to delegate what users, devices, and services can access their data, for how long, and under what circumstances with user-managed access
  • Comply with regulations like HIPAA and the EU GDPR with secure data sharing

Only 9% of IT professionals believe that current data privacy tools will be able to adapt to the needs of the emerging digital economy (See more results from our Privacy Survey)

customer identity management, customer identity

Our Digital Identity Solutions Cut Across Industries

Everything has a unique digital identity, from employees and customers to connected cars and drones. When you know who your users are and what they can do, you can cater to them and keep them safe. Check out our specific solutions to a variety of digital identity challenges.