Spearheaded by the reality of data breaches, as well as the adoption of cloud and social identities in the enterprise, the new IT perimeter has decision makers recalculating their IT management route. Inspired by consumer-grade convenience that meshes single sign-on with risk-based polices, access management practices are evolving to bridge the nexus of cloud, mobile and social.
More than half of those surveyed state that unprotected infrastructure is one of the biggest targets for cyber-attacks
Showing Global Results
Over six in ten say that the increasing volume of cloud applications in use makes them a target for cyber-attacks when asked to respondents who feel that cloud applications are a target for cyber-attacks.
Showing Global Results
Over half of respondents say that they would allow employees in their organization to log on to corporate resources using their social media credentials even with recent security breaches in mind
Showing Global Results
Over nine in ten of those surveyed cite that their organization’s security policies around access management have been influenced by breaches of consumer services in the last 12 months – this is even higher than in 2017 (90%) and 2016 (89%)
Showing Global Results
Respondents’ organizations are most likely to have adopted an on-premise IAM solution, with a smaller proportion having adopted IDaaS (58%), Cloud SSO (54%) and/or smart single sign-on (46%)
Showing Global Results
When it comes to drivers for implementing an access management solution, respondents are most likely to say that the threat of large scale breaches (24%) or simplified cloud access for end users (18%) are the most significant considerations
Showing Global Results
Almost all respondents say that controlling who has access to specific types of data can contribute toward their organization's ability to comply with data protection regulations and pass security audits.
Showing Global Results
The CIO/Head of IT is the most likely final decision maker in respondents’ organizations when it comes to selecting an access management solution; more than nine in ten (95%) say that they are involved to some extent
Showing Global Results
Just over one in three respondents say that it was difficult to sell the need for IT security to the board a year ago.
Showing Global Results
Find out how Global data compares to your region by clicking the button below