-
Report details
-
0
Figures
-
0
Tables
-
1
Executive Summary
-
Introduction
-
6
Research Findings
-
Identity Management Is Complex
-
2
Different Forms of Authentication Must Be Operationalized
-
2
Assessing Risk Across Human and Non-human Identities Is a Priority
-
1
Identity Proofing, Screening, and Monitoring Reduce Risk
-
Commercial CIAM Solutions Provide Performance, Scale, Security, and Privacy
-
1
The Identity Market Is Dynamic
-
3
Conclusion
-
Research Methodology
-
Respondent Demographics
|
ESG Research Report: Securing the Identity Perimeter with Defense in Depth
May 23, 2022
by
Bill Lundell
The core tenet of a zero trust strategy is least-privilege access. Yet, organizations continue to rely on user and machine identities that are susceptible to compromise, abuse/misuse, and theft. Risk is compounded by over-permissive, static access rights that provide little to no visibility into who and what is using access and how. Vaguer is how identities are being/should be monitored and protected. Availability of modern, cloud-managed identity services is widespread. Yet organizations have been slow to pivot their security programs from traditional endpoint, network, and SecOps to an approach that focuses on identity orchestration and experiences, which is dynamic and distributed. Where there are no perimeters, a multitude of identity verification services and managed identity services exist.
In order to gain insights into these trends, ESG surveyed 488 IT and cybersecurity professionals personally responsible for identity and access management programs, projects, processes, solutions/platforms, and services at large midmarket (500 to 999 employees) and enterprise (1,000 or more employees) organizations in North America (US and Canada).
Page Count: 29
Table of Contents
-
Executive Summary
(1)
-
Introduction
-
Research Findings
(6)
-
Identity Management Is Complex
-
Different Forms of Authentication Must Be Operationalized
(2)
-
Assessing Risk Across Human and Non-human Identities Is a Priority
(2)
-
Identity Proofing, Screening, and Monitoring Reduce Risk
(1)
-
Commercial CIAM Solutions Provide Performance, Scale, Security, and Privacy
-
The Identity Market Is Dynamic
(1)
-
Conclusion
(3)
-
Research Methodology
-
Respondent Demographics
|
Other Users Also Viewed
Aug 01, 2022
Security threats are on the upswing, businesses are hastening digital transformation plans, IT infrastructures are accelerating toward the cloud, and hybrid and remote workforces are the new reality. Enterprises have stepped up efforts to protect an…
|