24³â »ó¹Ý±â¿¡ IAM ¼Ö·ç¼ÇÀº ´õ ÀÌ»ó ´Ü¼øÇÑ »çÀ̹ö º¸¾È ¿ä±¸»çÇ×ÀÌ ¾Æ´Ï¶ó ºñÁî´Ï½º Çõ½ÅÀÇ ÇÙ½É ÃàÀÌ µÇ¾ú½À´Ï´Ù. ±â¾÷µéÀº AI, ÀÚµ¿È, ID ¸®½ºÅ© ºÐ¼®À» Ȱ¿ëÇÏ¿© »çÀ̹ö º¸¾È º¹¿ø·ÂÀ» °ÈÇϰí, Á¢¼Ó °Å¹ö³Í½º¸¦ °£¼ÒÈÇϸç, ±ÔÁ¤ Áؼö¸¦ ÃßÁøÇϰí ÀÖ½À´Ï´Ù. IAM ½ÃÀåÀÌ °è¼Ó ÁøÈÇÔ¿¡ µû¶ó ±â¾÷Àº »çÀ̹ö À§ÇùÀÌ È®´ëµÇ´Â ½Ã´ë¿¡ µðÁöÅÐ ID, Ŭ¶ó¿ìµå µµÀÔ, ºÐ»êÇü Á¢¼Ó ¸ðµ¨ÀÇ ¹Ì·¡¸¦ È®º¸Çϱâ À§ÇØ ID Àü·«À» Çö´ëÈÇØ¾ß ÇÕ´Ï´Ù. "ID °ü·Ã À§ÇùÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ¾Æ½Ã¾ÆÅÂÆò¾ç(ÀϺ», Áß±¹ Á¦¿Ü)(APEJC)ÀÇ ±â¾÷µéÀº ÁøÈÇÏ´Â °ø°Ý º¤Å͸¦ ¿ÏÈÇϱâ À§ÇØ AI ±â¹Ý ID À§Çù ŽÁö ¹× ´ëÀÀ(ITDR), À§Çè ÀûÀÀÇü ÀÎÁõ, ÀÚµ¿ÈµÈ ID °Å¹ö³Í½º¿¡ ¿ì¼±¼øÀ§¸¦ µÎ°í ÀÖ½À´Ï´Ù. ¸ÖƼŬ¶ó¿ìµå ¹× ÇÏÀ̺긮µå ȯ°æ Àü¹Ý¿¡¼ À߸øµÈ ±¸¼º, °úµµÇÑ ±ÇÇÑ, ÀÚ°ÝÁõ¸í ±â¹Ý °ø°Ý Ç¥¸éÀ» ÇØ°áÇϱâ À§ÇØ ID º¸¾È ż¼ °ü¸®(ISPM)·ÎÀÇ ÀüȯÀÌ ÀÌ·ç¾îÁö°í ÀÖ½À´Ï´Ù. ÇÑÆí, °³¹ß ¿î¿µ(DevOps), ¾ÖÇø®ÄÉÀÌ¼Ç ÇÁ·Î±×·¡¹Ö ÀÎÅÍÆäÀ̽º(API) ÅëÇÕ, AI ±â¹Ý ¿öÅ©·Îµå°¡ °ø°Ý Ç¥¸éÀ» È®ÀåÇÔ¿¡ µû¶ó ¸Ó½Å ID º¸¾ÈÀÌ Áß¿äÇØÁö°í ÀÖ½À´Ï´Ù. IDC ¾Æ½Ã¾ÆÅÂÆò¾çÀÇ »çÀ̹ö º¸¾È Á¦Ç° ¹× ¼ºñ½º ºÎ¹® ¼ö¼® ¸®¼Ä¡ ¸Å´ÏÀúÀÎ »ç½Ã ±×·Î¹ö´Â "°ø°ÝÀڵ麸´Ù ¾Õ¼ ³ª°¡·Á¸é Á¶Á÷Àº IAM°ú º¸¾È ºÐ¼®À» ÅëÇÕÇϰí, Çൿ À§Çè ¸ðµ¨À» ÅëÇØ Áö¼ÓÀûÀÎ ÀÎÁõÀ» ½ÃÇàÇϸç, Àû½Ã Á¢¼Ó Á¦¾î ¹× ½Ç½Ã°£ ÀÌ»ó ¡ÈÄ Å½Áö¸¦ Áö¿øÇÏ´Â Á¦·Î Æ®·¯½ºÆ® ÇÁ·¹ÀÓ¿öÅ©¸¦ äÅÃÇØ¾ß ÇÕ´Ï´Ù."¶ó°í ¸»ÇÕ´Ï´Ù.
In 1H24, IAM solutions were no longer just a cybersecurity requirement but a core pillar of business transformation. Organizations are leveraging AI, automation, and identity risk analytics to enhance cybersecurity resilience, streamline access governance, and drive compliance alignment. As the IAM market continues to evolve, enterprises must modernize their identity strategies to secure the future of digital identity, cloud adoption, and decentralized access models in an era of expanding cyberthreats."As identity-related threats escalate, enterprises in Asia/Pacific (excluding Japan and China) (APEJC) are prioritizing AI-driven identity threat detection and response (ITDR), risk-adaptive authentication, and automated identity governance to mitigate evolving attack vectors. The shift toward identity security posture management (ISPM) is addressing misconfigurations, excessive entitlements, and credential-based attack surfaces across multicloud and hybrid environments. Meanwhile, machine identity security is becoming critical, as development operations (DevOps), application programming interface (API) integrations, and AI-driven workloads expand the attack surface. To stay ahead of adversaries, organizations must integrate IAM with security analytics, enforce continuous authentication through behavioral risk models, and adopt a zero trust framework that enables just-in-time (JIT) access controls and real-time anomaly detection," says Sakshi Grover, senior research manager, Cybersecurity Products and Services, IDC Asia/Pacific.