RECENT STORIES:

Addressing digital sovereignty in a data-driven world
EU Parliament backs stricter copyright rules for generative AI trainin...
Mitrade Secures Five Awards as ASX 200 Retreats From Record Highs Amid...
Comviva Launches NGAGE for Enterprises to Power Secure, AI-Driven Cust...
U POWER’s Electric Heavy Trucks Pass Comprehensive Operational T...
Fractal unveils intelligent sales agents to accelerate B2B growth
LOGIN REGISTER
DigiconAsia
  • Features
    • Featured

      AI-driven manufacturing can reshape South-east Asia amid skills, cost and security challenges

      AI-driven manufacturing can reshape South-east Asia amid skills, cost and security challenges

      Wednesday, March 11, 2026, 2:49 PM Asia/Singapore | Features, Newsletter
    • Featured

      How AI is reshaping dating in Asia

      How AI is reshaping dating in Asia

      Monday, February 9, 2026, 5:00 AM Asia/Singapore | Features, Newsletter
    • Featured

      What’s next for augmented reality?

      What’s next for augmented reality?

      Wednesday, February 4, 2026, 8:41 AM Asia/Singapore | Features
  • News
    • Featured

      EU Parliament backs stricter copyright rules for generative AI training and creator compensation

      EU Parliament backs stricter copyright rules for generative AI training and creator compensation

      Thursday, March 12, 2026, 11:03 AM Asia/Singapore | News, Newsletter
    • Featured

      Pentagon labels US AI startup’s military-use restrictions as a “supply chain risk”

      Pentagon labels US AI startup’s military-use restrictions as a “supply chain risk”

      Wednesday, March 11, 2026, 1:51 PM Asia/Singapore | News, Newsletter
    • Featured

      From spreadsheet-based operations to cloud-based analytics and automated reporting: Multicare Pharmaceutical

      From spreadsheet-based operations to cloud-based analytics and automated reporting: Multicare Pharmaceutical

      Tuesday, March 10, 2026, 9:33 AM Asia/Singapore | News, Newsletter
  • Perspectives
  • Tips & Strategies
  • Whitepapers
  • Awards 2023
  • Directory
  • E-Learning

Select Page

Tips & Strategies

Adaptive IAM: balancing UX, security, and agentic AI threats without friction

By Jasie Fon, Regional Vice President (Asia), Ping Identity | Tuesday, December 23, 2025, 8:01 AM Asia/Singapore

Adaptive IAM: balancing UX, security, and agentic AI threats without friction

Are your organization’s identity and access management protocols being updated to match the pace of AI-driven cyber threats and scams frictionlessly?

Today, customers demand seamless digital experiences amid abundant options. A single flawed login, unnecessary verification step, or untrustworthy interface can result in user abandonment, often permanently, according to some customer satisfaction surveys.

Users remain highly aware of privacy and security risks, driven by frequent data breach exposures. The average user encounters such threats regularly. In Singapore, the nation’s Personal Data Protection Commission (PDPC) had issued a report revealing ransomware breaches affecting over 14,477 individuals in early 2025, stemming from exploited administrative accounts, inadequate access controls, and weak password security.

For the rest of the year, PDPC had documented similar incidents, with affected counts reaching hundreds of thousands across cases involving ransomware variants that bypassed basic protections.​ Other data protection agencies in the region have released similarly concerning statistics.

In the perspective of business and most other web strategies, seamless user experience (UX) and data security can constitute conflicting priorities. To address this authentication challenge gap, robust identity and access management (IAM) strategies can be implemented for both human users and AI agents.

Bridging UX and security gaps

Security and UX need not conflict as a zero-sum dynamic. Password reliance exposes vulnerabilities through cracking or reuse; excessive security frustrates users, leading to forgotten credentials or abandoned transactions.​

When authentication systems fail to integrate UX and security effectively, the result is the erosion of trust. Amid rising AI-driven threats such as deepfakes and sophisticated phishing campaigns, the exploitation of human and system weaknesses widens the trust gap even further.

As agentic AI becomes more widespread, organizations will need to be vigilant about managing unique credentials, scoped permissions, and oversight for safe operation. Without these, agents risk prompt injection, over-privileged access, or unintended data exfiltration.​

Harmonizing UX and security

Security integrated early in design reduces later friction from retrofitted measures. Other benefits include:

  • Contextual friction will be accepted as necessary: bank customers expect added steps for large transfers to prevent unauthorized actions
  • Invisible security layers enhance seamlessness, particularly in retail where extended sessions reduce cart abandonment by minimizing interruptions
  • Poor UX prompts user workarounds, such as shared credentials or bypassed controls, creating exploitable security gaps for attackers
  • AI-agent security demands systems distinguish trusted agents from malicious bots, applying consistent verification principles

Strategic IAM considerations

IAM now spans IT, marketing, product, security, and support functions, requiring coordinated implementation. For example, a bank app permits smooth access on familiar devices, but verifies logins originating from new locations. Similarly, IAM streamlines authentication across user journeys without constant prompts, aligning protection with context.

However, in the agentic era, IAM has to control AI agent lifecycle management, including credential issuance, permission scoping, and continuous monitoring — to align actions with user intent and prevent escalation.

IAM protocols must adapt to fast-evolving threats such as ransomware persistence, user expectations for frictionless access, and regulations such as PDPC guidelines. This secures both human and non-human identities amid growing AI adoption.

In order to serve their intended function, IAM protocols need to be agile and nimble. And with AI agents poised to become active participants in digital ecosystems, leaders need to make sure that their IAM implementations and related access management systems are updated to secure both human and non-human identities.

Share:

PreviousHCLSoftware to Acquire Jaspersoft from Cloud Software Group
NextLotusia Group Highlights the Leadership of Co-CEO Jacob Tao as the Company Enters a New Phase of Cross-Border Expansion and Community Impact

Related Posts

The future of data centers in Asia Pacific

The future of data centers in Asia Pacific

November 27, 2025

Banking on eco-friendly credit cards to boost eco awareness in Asia

Banking on eco-friendly credit cards to boost eco awareness in Asia

October 13, 2021

Lifebuoy sets up metaverse thinktank for business and social missions

Lifebuoy sets up metaverse thinktank for business and social missions

October 4, 2022

Averting leaks and hazards in chemical plants and laboratories

Averting leaks and hazards in chemical plants and laboratories

January 19, 2022

Leave a reply Cancel reply

You must be logged in to post a comment.

Awards Nomination Banner

gamification list

PARTICIPATE NOW

top placement

Whitepapers

  • Achieve Modernization Without the Complexity

    Achieve Modernization Without the Complexity

    Transforming IT infrastructure is crucial …Download Whitepaper
  • 5 Steps to Boost IT Infrastructure Reliability

    5 Steps to Boost IT Infrastructure Reliability

    In today's fast-evolving tech landscape, …Download Whitepaper
  • Simplify Payroll Setup for Your Small Business

    Simplify Payroll Setup for Your Small Business

    In our free guide, "How …Download Whitepaper
  • Overcoming the Challenges of Cost & Complexity in the Cloud-first Era.

    Overcoming the Challenges of Cost & Complexity in the Cloud-first Era.

    Download Whitepaper

Middle Placement

Case Studies

  • Nokia integrates all-flash data infrastructure into telco cloud for network modernization

    Nokia integrates all-flash data infrastructure into telco cloud for network modernization

    Its December 2025 upgrade supports …Read More
  • Overcoming workforce challenges in Japan’s healthcare sector with generative AI: JCHO Osaka Hospital

    Overcoming workforce challenges in Japan’s healthcare sector with generative AI: JCHO Osaka Hospital

    A digitalization initiative launching by …Read More
  • Kingspan Insulation unifies 90‑site corporate network for enhanced agility and control

    Kingspan Insulation unifies 90‑site corporate network for enhanced agility and control

    Kingspan Insulation, Expereo, global network, …Read More
  • Genspark adopts AI-driven voice automation platform to boost global communication for customers

    Genspark adopts AI-driven voice automation platform to boost global communication for customers

    Genspark, Twilio, AI voice automation, …Read More

Bottom Sidebar

Other News

  • Mitrade Secures Five Awards as ASX 200 Retreats From Record Highs Amid RBA Tightening

    March 12, 2026
    MELBOURNE, Australia, March 12, 2026 …Read More »
  • Comviva Launches NGAGE for Enterprises to Power Secure, AI-Driven Customer Engagement at Scale

    March 11, 2026
    – Next-generation CPaaS platform that …Read More »
  • U POWER’s Electric Heavy Trucks Pass Comprehensive Operational Testing and Full-Stack Integration of Battery-Swapping System; 1,000 Units Set for Thailand Rollout

    March 11, 2026
    BANGKOK, March 11, 2026 /PRNewswire/ …Read More »
  • Fractal unveils intelligent sales agents to accelerate B2B growth

    March 11, 2026
    Flyfish.ai now deploys 35+ coordinated …Read More »
  • From Celebration to Community: How Vantage’s Spring Festival Campaign Highlighted Shared Trading Experiences

    March 11, 2026
    SINGAPORE, March 11, 2026 /PRNewswire/ …Read More »
  • Our Brands
  • CybersecAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 DigiconAsia All Rights Reserved.