-
Report details
-
24
Figures
-
0
Tables
-
Executive Summary
-
Introduction
-
Research Findings
-
The complexion of public cloud usage is increasingly business-critical, but in…
-
The need to secure access to a diverse range of applications makes maintaining…
-
Cloud-related cybersecurity incidents highlight the connection between data and…
-
Organizational convergence and vendor consolidation are underway to enable a…
-
Zero trust is driving a focus on MFA, device profiling, and user monitoring, as…
-
Conclusion
-
Research Methodology
-
Respondent Demographics
|
ESG Research Report: Trends in Identity and Access Management: The Increasingly Cloud-driven Identity Landscape
ESG Research Report
Feb 11, 2021
The broad adoption of public cloud services demands a retooling of identity and access management programs. Perimeter security must evolve from a traditional castle and moat model to one that focuses on cloud identities inclusive of service accounts, as well as individual users and the data they access. To protect sensitive cloud-resident data, cybersecurity and IT operations teams need to work with their line-of-business teams on strengthening identity programs with both the user experience and risk in mind.
In order to gain insight into these trends, ESG surveyed 379 IT and cybersecurity professionals at organizations in North America (US and Canada) personally responsible for evaluating or purchasing identity and access management and cloud security technology products and services. This research aimed to understand the problem space, organizational responsibilities, compliance implications, and plans for securing user access to a wide portfolio of cloud services. The study also looked at the current and planned use of various authentication methods, privileged access management, device profiling, unified directories, user activity analytics, and service account protection.
Page Count: 23
Table of Contents
-
Executive Summary
-
Introduction
-
Research Findings
-
The complexion of public cloud usage is increasingly business-critical, but in a hybrid, multi-cloud context.
-
The need to secure access to a diverse range of applications makes maintaining IAM consistency the top challenge.
-
Cloud-related cybersecurity incidents highlight the connection between data and identities.
-
Organizational convergence and vendor consolidation are underway to enable a shift from a siloed to unified approach.
-
Zero trust is driving a focus on MFA, device profiling, and user monitoring, as well as an expansion of IDaaS use cases.
-
Conclusion
-
Research Methodology
-
Respondent Demographics
|
|