As organizations add thousands of new devices to their internal and cloud-based networks, identity and access management (IAM) technology will go through a massive transformation. Each device will have an identity with multiple attributes, and each of these attributes must be understood to enable good things to occur and block bad things from happening. An organizations IAM infrastructure will have to accommodate: Massive scale, perpetual connectivity, and processing power to monitor the whole enchilada. To maintain availability, high-performance, and security, the Internet of identities will require continuous monitoring.”]

