Research Report: The State of Identity Security: Opening Doors for the Right Entities and Locking Out the Bad Actors
Research Report

Jul 15, 2024
by Todd Thiemann, Bill Lundell, Enterprise Strategy Group Research
Organizations continue to rely on identities that are susceptible to compromise, abuse, misuse, and theft. Risk is compounded by over-permissive, static access rights that provide little to no visibility into access trends or, most importantly, who is accessing what and how they are doing so.

Despite the transformation to a dynamic, amorphous perimeter, a multitude of identity security solutions and managed identity services exist. Unfortunately, organizations have been slow to pivot their security programs to an approach that incorporates identities as a foundational aspect of their cybersecurity strategy.

However, CISOs and security professionals are beginning to understand the importance of securing identities. With a decade of evidence on the risks and a plethora of identity security solutions, identity is shifting from the domain of IT operations into cybersecurity.

To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 372 IT, cybersecurity, and application development professionals at organizations in North America (US and Canada) responsible for or involved with identity security technologies and processes.
 

Page Count: 24