Whenever you visit our websites, information may be collected using cookies and similar tools to improve your user experience and to enhance the performance of the website.
Closing this message means you accept the use of cookies.
Non-human Machine and Workload Identities Outnumber Workforce Identities
Multiple Account or Credential Compromise Is the Norm
MFA and Passwordless Authentication Implementations Are Becoming Extensive
Cloud Provides Identity Challenges While ITDR and ISPM Gain Momentum
Identity Security Is a Team Sport
Investment in Identity Security Is Growing
Conclusion
Research Methodology
Respondent Demographics
Research Report: The State of Identity Security: Opening Doors for the Right Entities and Locking Out the Bad Actors
Research Report
Jul 15, 2024
by
Todd Thiemann, Bill Lundell, Enterprise Strategy Group Research
Organizations continue to rely on identities that are susceptible to compromise, abuse, misuse, and theft. Risk is compounded by over-permissive, static access rights that provide little to no visibility into access trends or, most importantly, who is accessing what and how they are doing so.
Despite the transformation to a dynamic, amorphous perimeter, a multitude of identity security solutions and managed identity services exist. Unfortunately, organizations have been slow to pivot their security programs to an approach that incorporates identities as a foundational aspect of their cybersecurity strategy.
However, CISOs and security professionals are beginning to understand the importance of securing identities. With a decade of evidence on the risks and a plethora of identity security solutions, identity is shifting from the domain of IT operations into cybersecurity.
To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 372 IT, cybersecurity, and application development professionals at organizations in North America (US and Canada) responsible for or involved with identity security technologies and processes.
Page Count: 24
Table of Contents
Executive Summary
Report Conclusions
Introduction
Research Objectives
Research Findings
Non-human Machine and Workload Identities Outnumber Workforce Identities
Multiple Account or Credential Compromise Is the Norm
MFA and Passwordless Authentication Implementations Are Becoming Extensive
Cloud Provides Identity Challenges While ITDR and ISPM Gain Momentum