SlideShare a Scribd company logo
1 of 14
Download to read offline
How the World’s Largest Organizations Are
Evolving with Technology
Digital
Enterprise
Report
The Okta 2019
INTRODUCTION
Who is Okta?
Okta is the leading independent provider of identity for the enterprise.
We ensure that organizations in every country, sector, and industry can
seamlessly connect their employees, partners, and customers to the
technologies they need using The Okta Identity Cloud, our neutral,
independent platform that securely connects the right people to the
right technologies at the right time.
p. 2
INTRODUCTION
Today’s corporate landscape is complex, with dynamic workforce
ecosystems, diverse technology stacks, and increased cybersecurity
threats driven by digital innovation.
How are today’s leading companies dealing with
the change and evolving for the future?
Okta commissioned a survey, conducted by Qualtrics, looking at global
enterprises with $1B+ revenue and 10,000+ employees
1,050 IT, security, and engineering decision makers answered the survey
p. 3
1. Evolving Workforces
As global companies compete in
increasingly diverse markets, they’re relying
on remote workers and contractors to meet
their changing needs.
Yet decision makers have reservations about
hiring more remote and contract workers.
Nearly 40% of respondents say that a fully
remote workforce poses a security threat.
of respondents expect their
companies to hire more
contract-based employees
in the near future
45%
63%
63%
expect to see an increase in
remote workers (including
contractors) as well
cite security concerns
41% cite efficiency concerns
p. 4
SECTION1:EVOLVINGWORKFORCES
Are IT Leaders Realists or Idealists When it Comes to Security?
Decision makers are acutely aware of the cybersecurity risks their companies face. However,
many of them overestimate their ability to respond to incidents.
According to the Ponemon Institute’s 2018 Cost of a Data Breach Study:
The mean time to identify a breach is 197 days
The mean time to contain a breach is 69 days
Yet 75% of respondents believe they would identify a breach immediately or within 24 hours
Confidence in Breach Containment
p. 5
SECTION1:EVOLVINGWORKFORCES
Zero Trust is trending, but Strong Multi-factor Authentication is lagging
There’s no longer a “trusted” network of internal employees. The identities of every individual and
device must be constantly verified through a Zero Trust approach to security.
Low Assurance MFA
Security Questions
SMS, Voice, Email One-Time Password
of respondents are
already working on
Zero Trust strategies
60%
of mid-level leaders say
they are working towards
Zero Trust compared to
of executives, indicating that
IT managers and directors are
spearheading these initiatives
Multi-factor authentication (MFA) adds another security layer for a distributed network, but 61% of
respondents favored weak factors such as security questions and one-time passwords.
64% 57%
Stronger MFA
Software One-Time Password
Physical and U2F Tokens
Biometric-Based
p. 6
SECTION1:EVOLVINGWORKFORCES
A Growing Global App-etite
But while many companies are increasing their cloud app count,
they’re not running all their apps in the cloud
75% of survey respondents are running
apps in the cloud, yet adoption
volumes range dramatically: some
are limited to 1–10 apps, while
others are well over 100
67% of respondents say their companies’
total number of cloud apps will
increase in the coming year
85% of technology decision makers
expect at least a third of their
apps to be on-premises
70% say that their companies are less
than half way to meeting their
end state targets
p. 7
More than half of survey respondents are now deploying multiple clouds — and 60% have
done so within the last two years
2. Cloud Technology and Operations
Companies are evolving quickly and relying on cloud infrastructure to do it. Hybrid and
multi-cloud solutions are on the rise, as is Infrastructure as a Service (IaaS).
of survey respondents say they will increase
IaaS in the coming year, in order to60%
Improve customer experiences Drive collaboration Rapidly bring new products to market
p. 8
Half of the companies surveyed are in the process of digital transformation:
3. Digital Transformation
But why are they doing it? Ultimately, it comes down to great expectations across:
Improve customer experiences Competitive advantage Growth into new markets
have a formal
digitalization strategy
in place that they are
actively working on
24% are building out
a formal plan
are currently
considering it, but
have no formalized
plans yet
26% 32%
p. 9
SECTION3:DIGITALTRANSFORMATION
Agile App Development is a Driving Force in Digital Transformation
To make sure developers have what they need to do their jobs, companies are investing in:
Collectively, 85% of digitally-transforming global giants are investing in at least
one of these technologies.
Companies that are in the midst of digital transformation and agile development
are also more likely to have invested in IaaS — 67%, in contrast to the collective
60% average.
60%
Containerization
66%
Microservices
62%
Functions-as-a-Service
65%
Continuous Delivery
p. 10
invest in Internet of Things
72%
SECTION3:DIGITALTRANSFORMATION
Placing Bets on the Next Big Thing
The world’s top digitally transforming organizations are predicting — and investing in — the biggest
technological breakthroughs:
invest in artificial intelligence
68%
invest in blockchain invest in augmented reality
of respondents with a digital
transformation agenda were
working in Zero Trust
72% of respondents without a digital
transformation agenda were
working in Zero Trust
47%
Companies that are working to digitally transform are more likely to be on top of Zero Trust:
61% 58%
p. 11
SECTION3:DIGITALTRANSFORMATION
of respondents currently give
customers limited control over
what they share, compared
to 31% who provide their
customers with total control
48%
Better Privacy Protections Across the Board
Businesses everywhere are rethinking their approach to privacy—and that includes the world’s
largest organizations. They’re not just thinking about customers, either.
of respondents say they foresee
giving customers more granular
controls in the coming year
49%
expect their global companies
will give increased control to
their employees
43% expect to grant less control
15%
However
Whereas
p. 12
SECTION3:DIGITALTRANSFORMATION
Investing in the Future by Being Forward-looking
Nearly every respondent showcased their organization adopting technology to achieve its goals,
but what makes a company truly forward-looking?
Here are some key dimensions that highlight who’s leading the leaders:
of respondents were
making progress on at least
two of the key dimensions
previously discussed
of all companies
surveyed are making
progress on at least
four key dimensions
However86% 41%
Pursuing Zero Trust strategy
Pursuing digital transformation
Using any of the four agile development technologies
Using any of the strong MFA types
Increasing IaaS usage
Have at least 30% of apps in the cloud
Prioritizing customer experience
p. 13
CONCLUSION
Modern enterprises are embracing digital transformation, improving
their technology and operations, and evolving their workforces. We
encourage you to check out the full Digital Enterprise Report. You can
see the survey responses and data in detail, and read our analysis to get
a complete sense of how today’s global companies are rapidly evolving.
Have questions about Okta and how we can help with your
organization’s digital transformation?
Contact our team.
p. 14

More Related Content

What's hot

Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15
Mike Lemons
 

What's hot (20)

Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
9.35am robert humphrey
9.35am robert humphrey9.35am robert humphrey
9.35am robert humphrey
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 
CIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - oktaCIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - okta
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS:  Achieve Both Security and Workforce ProductivityZero-compromise IDaaS:  Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Product Assessment and Consulting Offerings
Product Assessment and Consulting OfferingsProduct Assessment and Consulting Offerings
Product Assessment and Consulting Offerings
 

Similar to Okta Digital Enterprise Report

Technolony Vision 2016 - Primacy Of People First In A Digital World - Vin Mal...
Technolony Vision 2016 - Primacy Of People First In A Digital World - Vin Mal...Technolony Vision 2016 - Primacy Of People First In A Digital World - Vin Mal...
Technolony Vision 2016 - Primacy Of People First In A Digital World - Vin Mal...
Vin Malhotra
 

Similar to Okta Digital Enterprise Report (20)

Digital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactDigital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the Impact
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
 
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
 
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
 
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018
 
How Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital TransformationHow Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital Transformation
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility Survey
 
Abraçar a Tecnologia Digital - A nova estratégia imperativa
Abraçar a Tecnologia Digital - A nova estratégia imperativaAbraçar a Tecnologia Digital - A nova estratégia imperativa
Abraçar a Tecnologia Digital - A nova estratégia imperativa
 
Embracing Digital Technology: A New Strategic Imperative
Embracing Digital Technology: A New Strategic ImperativeEmbracing Digital Technology: A New Strategic Imperative
Embracing Digital Technology: A New Strategic Imperative
 
TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Cloud Native Development
Cloud Native DevelopmentCloud Native Development
Cloud Native Development
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Keynote address channel middle east 2013
Keynote address channel middle east 2013Keynote address channel middle east 2013
Keynote address channel middle east 2013
 
Technolony Vision 2016 - Primacy Of People First In A Digital World - Vin Mal...
Technolony Vision 2016 - Primacy Of People First In A Digital World - Vin Mal...Technolony Vision 2016 - Primacy Of People First In A Digital World - Vin Mal...
Technolony Vision 2016 - Primacy Of People First In A Digital World - Vin Mal...
 
The Five Essential Truths of the Application Economy
The Five Essential Truths of the Application EconomyThe Five Essential Truths of the Application Economy
The Five Essential Truths of the Application Economy
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Okta Digital Enterprise Report

  • 1. How the World’s Largest Organizations Are Evolving with Technology Digital Enterprise Report The Okta 2019
  • 2. INTRODUCTION Who is Okta? Okta is the leading independent provider of identity for the enterprise. We ensure that organizations in every country, sector, and industry can seamlessly connect their employees, partners, and customers to the technologies they need using The Okta Identity Cloud, our neutral, independent platform that securely connects the right people to the right technologies at the right time. p. 2
  • 3. INTRODUCTION Today’s corporate landscape is complex, with dynamic workforce ecosystems, diverse technology stacks, and increased cybersecurity threats driven by digital innovation. How are today’s leading companies dealing with the change and evolving for the future? Okta commissioned a survey, conducted by Qualtrics, looking at global enterprises with $1B+ revenue and 10,000+ employees 1,050 IT, security, and engineering decision makers answered the survey p. 3
  • 4. 1. Evolving Workforces As global companies compete in increasingly diverse markets, they’re relying on remote workers and contractors to meet their changing needs. Yet decision makers have reservations about hiring more remote and contract workers. Nearly 40% of respondents say that a fully remote workforce poses a security threat. of respondents expect their companies to hire more contract-based employees in the near future 45% 63% 63% expect to see an increase in remote workers (including contractors) as well cite security concerns 41% cite efficiency concerns p. 4
  • 5. SECTION1:EVOLVINGWORKFORCES Are IT Leaders Realists or Idealists When it Comes to Security? Decision makers are acutely aware of the cybersecurity risks their companies face. However, many of them overestimate their ability to respond to incidents. According to the Ponemon Institute’s 2018 Cost of a Data Breach Study: The mean time to identify a breach is 197 days The mean time to contain a breach is 69 days Yet 75% of respondents believe they would identify a breach immediately or within 24 hours Confidence in Breach Containment p. 5
  • 6. SECTION1:EVOLVINGWORKFORCES Zero Trust is trending, but Strong Multi-factor Authentication is lagging There’s no longer a “trusted” network of internal employees. The identities of every individual and device must be constantly verified through a Zero Trust approach to security. Low Assurance MFA Security Questions SMS, Voice, Email One-Time Password of respondents are already working on Zero Trust strategies 60% of mid-level leaders say they are working towards Zero Trust compared to of executives, indicating that IT managers and directors are spearheading these initiatives Multi-factor authentication (MFA) adds another security layer for a distributed network, but 61% of respondents favored weak factors such as security questions and one-time passwords. 64% 57% Stronger MFA Software One-Time Password Physical and U2F Tokens Biometric-Based p. 6
  • 7. SECTION1:EVOLVINGWORKFORCES A Growing Global App-etite But while many companies are increasing their cloud app count, they’re not running all their apps in the cloud 75% of survey respondents are running apps in the cloud, yet adoption volumes range dramatically: some are limited to 1–10 apps, while others are well over 100 67% of respondents say their companies’ total number of cloud apps will increase in the coming year 85% of technology decision makers expect at least a third of their apps to be on-premises 70% say that their companies are less than half way to meeting their end state targets p. 7
  • 8. More than half of survey respondents are now deploying multiple clouds — and 60% have done so within the last two years 2. Cloud Technology and Operations Companies are evolving quickly and relying on cloud infrastructure to do it. Hybrid and multi-cloud solutions are on the rise, as is Infrastructure as a Service (IaaS). of survey respondents say they will increase IaaS in the coming year, in order to60% Improve customer experiences Drive collaboration Rapidly bring new products to market p. 8
  • 9. Half of the companies surveyed are in the process of digital transformation: 3. Digital Transformation But why are they doing it? Ultimately, it comes down to great expectations across: Improve customer experiences Competitive advantage Growth into new markets have a formal digitalization strategy in place that they are actively working on 24% are building out a formal plan are currently considering it, but have no formalized plans yet 26% 32% p. 9
  • 10. SECTION3:DIGITALTRANSFORMATION Agile App Development is a Driving Force in Digital Transformation To make sure developers have what they need to do their jobs, companies are investing in: Collectively, 85% of digitally-transforming global giants are investing in at least one of these technologies. Companies that are in the midst of digital transformation and agile development are also more likely to have invested in IaaS — 67%, in contrast to the collective 60% average. 60% Containerization 66% Microservices 62% Functions-as-a-Service 65% Continuous Delivery p. 10
  • 11. invest in Internet of Things 72% SECTION3:DIGITALTRANSFORMATION Placing Bets on the Next Big Thing The world’s top digitally transforming organizations are predicting — and investing in — the biggest technological breakthroughs: invest in artificial intelligence 68% invest in blockchain invest in augmented reality of respondents with a digital transformation agenda were working in Zero Trust 72% of respondents without a digital transformation agenda were working in Zero Trust 47% Companies that are working to digitally transform are more likely to be on top of Zero Trust: 61% 58% p. 11
  • 12. SECTION3:DIGITALTRANSFORMATION of respondents currently give customers limited control over what they share, compared to 31% who provide their customers with total control 48% Better Privacy Protections Across the Board Businesses everywhere are rethinking their approach to privacy—and that includes the world’s largest organizations. They’re not just thinking about customers, either. of respondents say they foresee giving customers more granular controls in the coming year 49% expect their global companies will give increased control to their employees 43% expect to grant less control 15% However Whereas p. 12
  • 13. SECTION3:DIGITALTRANSFORMATION Investing in the Future by Being Forward-looking Nearly every respondent showcased their organization adopting technology to achieve its goals, but what makes a company truly forward-looking? Here are some key dimensions that highlight who’s leading the leaders: of respondents were making progress on at least two of the key dimensions previously discussed of all companies surveyed are making progress on at least four key dimensions However86% 41% Pursuing Zero Trust strategy Pursuing digital transformation Using any of the four agile development technologies Using any of the strong MFA types Increasing IaaS usage Have at least 30% of apps in the cloud Prioritizing customer experience p. 13
  • 14. CONCLUSION Modern enterprises are embracing digital transformation, improving their technology and operations, and evolving their workforces. We encourage you to check out the full Digital Enterprise Report. You can see the survey responses and data in detail, and read our analysis to get a complete sense of how today’s global companies are rapidly evolving. Have questions about Okta and how we can help with your organization’s digital transformation? Contact our team. p. 14