Fragmented approach to identity security management creates risk

One Identity published global survey findings that revealed a significant increase in digital identities on a global scale. This phenomenon – known as identity proliferation – was due to increases in user identities (internal, third parties and customers), machine identities and new accounts created in response to an increase in remote work.

More than 8 out of 10 respondents indicated that managed identities doubled more than doubled, with 25% reporting a 10-fold increase over the period.

Doubling managed identities, creating risk

According to a Dimensional Research survey of 1,009 IT security professionals, identity proliferation is one critical hurdle to overcome when businesses seek to streamline their overall cyber security position, with half of all companies reporting using more than 25 different access rights management systems.

More than one in five respondents uses more than 100. A second challenge is how most organizations approach identity security. 51 percent of respondents indicated that the proliferation of silos results in invisibility as to who has access to which system.

The result of managing identity security in silos is significant levels of complexity and risk. Eighty-five percent of organizations have employees with more preferred access than required, making it easier for bad players to take advantage of unknowing internal stakeholders to gain access to a given organization.

Only 12 percent of professionals are completely confident that they can prevent a credential-based attack, which occurs when attackers steal internal credentials to gain initial access, bypassing the organization’s security measures.

“Almost every day we see a new cyber event make headlines, mainly because organizations are managing more identities than ever before and because they are unable to achieve a 360-degree view of all their identities – creating gaps, inconsistencies and expanding windows of exposure,” he said. In Hughwat Swarup, President and GM, One Identity.

“We have seen firsthand that a holistic identity management strategy is a proven way for organizations to optimize visibility, control and protection.”

An identity management platform and a unified approach will help

A trend of end-to-end access to identity security was highlighted in the survey, with half of respondents indicating that end-to-end consolidation of identities and accounts is needed to better respond to emerging market conditions. Nearly two-thirds of respondents stated that an identity management and unified approach platform would streamline their business approach.

Industry practices recognize that while ransom concerns (66 percent), phishing (52 percent) and RPA adoption remain in the forefront (94 percent of organizations that run bots or RPAs report challenges that promise them), companies must plan to strengthen business resilience where they can – including investment In Identity Management and Enhanced Governance (IGA) and Preferred Access Management (PAM) solutions that can secure and control emerging identity ecosystems.

Source

One Identity published global survey findings that revealed a significant increase in digital identities on a global scale. This phenomenon – known as identity proliferation – was due to increases in user identities (internal, third parties and customers), machine identities and new accounts created in response to an increase in remote work.

More than 8 out of 10 respondents indicated that managed identities doubled more than doubled, with 25% reporting a 10-fold increase over the period.

Doubling managed identities, creating risk

According to a Dimensional Research survey of 1,009 IT security professionals, identity proliferation is one critical hurdle to overcome when businesses seek to streamline their overall cyber security position, with half of all companies reporting using more than 25 different access rights management systems.

More than one in five respondents uses more than 100. A second challenge is how most organizations approach identity security. 51 percent of respondents indicated that the proliferation of silos results in invisibility as to who has access to which system.

The result of managing identity security in silos is significant levels of complexity and risk. Eighty-five percent of organizations have employees with more preferred access than required, making it easier for bad players to take advantage of unknowing internal stakeholders to gain access to a given organization.

Only 12 percent of professionals are completely confident that they can prevent a credential-based attack, which occurs when attackers steal internal credentials to gain initial access, bypassing the organization’s security measures.

“Almost every day we see a new cyber event make headlines, mainly because organizations are managing more identities than ever before and because they are unable to achieve a 360-degree view of all their identities – creating gaps, inconsistencies and expanding windows of exposure,” he said. In Hughwat Swarup, President and GM, One Identity.

“We have seen firsthand that a holistic identity management strategy is a proven way for organizations to optimize visibility, control and protection.”

An identity management platform and a unified approach will help

A trend of end-to-end access to identity security was highlighted in the survey, with half of respondents indicating that end-to-end consolidation of identities and accounts is needed to better respond to emerging market conditions. Nearly two-thirds of respondents stated that an identity management and unified approach platform would streamline their business approach.

Industry practices recognize that while ransom concerns (66 percent), phishing (52 percent) and RPA adoption remain in the forefront (94 percent of organizations that run bots or RPAs report challenges that promise them), companies must plan to strengthen business resilience where they can – including investment In Identity Management and Enhanced Governance (IGA) and Preferred Access Management (PAM) solutions that can secure and control emerging identity ecosystems.

Source

More from author

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Related posts

Advertismentspot_img

Latest posts

Security For Want of a Nail

Do not Overlook Lifecycle and Data Management Details By Gregory Hoffer, CEO, Coviant Software Threat actors are a relentless bunch. They continue to evolve their...

Threat Intelligence Services Are Universally Valued by IT Staff

Almost all IT professionals believe that threat intelligence services and feeds will help their company get ready for and repulse malware attacks. Only...

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!