SlideShare une entreprise Scribd logo
1  sur  16
New Research: Two-Thirds of
Companies Don’t Know What
Users Are Doing After Log-in
Study of IT Decision-Makers Reveals Security Risks and
Operational Flaws with Identity & Access Management
Strategies
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 2
Symplified IAM Research: Key Findings
Businesses today use up to 50 on-premises apps and 25 cloud
apps, so identity and access management (IAM) technologies
to secure data and deliver user convenience can be critical.
But new research from shows many
organizations using IAM solutions still don’t know what people
are doing while logged into those applications.
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 3
Symplified IAM Research: Key Findings
64% of businesses
don’t know what
users are doing
beyond login,
whether access is via
a computer, mobile
device, or both.
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 4
Symplified IAM Research: Key Findings
38% experienced
unauthorized access
24% experienced a hack
exposing user
credentials.
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 5
Symplified IAM Research: Key Findings
“Hacks and accidental data exposure are always a concern, but
lack of visibility and control are also a red flag. 86% of the IT
pros we surveyed maintain two or more repositories for user
identities — a practice that can lead to access and policy
violations. BYOD and SaaS used together also present a unique
challenge; as employees and partners use more of their own
devices, organizations lose visibility into what they’re doing.
Know your security, compliance and other specific needs as
you build out your identity management strategy.”
--Shayne Higdon, CEO and President, Symplified
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 6
Who Is Using Corporate Applications
Who businesses are connecting to their applications:
» 50% authorize at least 250 partners
» 54% authorize at least 250 contractors and consultants
» 55% authorize 1,500 or more employees
» 45% authorize 4,000 or more customers
76% allow employees to access corporate applications via
mobile devices; 68% allow partners to do so
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 7
Identity Management
Trends Across 3 Industries
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 8
Trends By Industry
Can’t see what users are doing after log-in:
Inability to audit user activity
can compromise intellectual
property and lead to compliance
issues
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 9
Trends By Industry
Experienced unauthorized access:
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 10
Trends By Industry
Maintain 2 or more repositories for user identities:
This practice can lead to access
and policy violations
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 11
Best Practices
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 12
Best Practices: Building An IAM Strategy
A proxy-based solution can provide a detailed audit log of what
people do while logged into an application, not just when they
logged in.
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 13
Best Practices: Building An IAM Strategy
Explore whether the solution can provide IT with centralized
management and control to automatically enforce policies at a
granular level.
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 14
Best Practices: Building An IAM Strategy
Know whether the solution replicates user data in the cloud,
which violates some end user agreements and increases the
attack surface on sensitive data.
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 15
About The Research
Symplified commissioned a survey that was conducted
between April 25 and May 2, 2013 among 225 IT professionals
at US-based companies ranging in size who completed a web-
based survey from Qualtrics, Inc. At the 95% confidence level
the margin of error is +/6.53 percentage points.
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 16
About Symplified
Symplified enables IT organizations to simplify user access to
applications, regain visibility and control over usage and meet
security and compliance requirements. Symplified provides
single sign-on, identity and access management, directory
integration, centralized provisioning, strong authentication,
mobile device support and flexible deployment options.
Symplified is headquartered in Boulder, Colorado, and can be
found online at www.symplified.com.

Contenu connexe

Tendances

Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Jeremiah Grossman
 

Tendances (17)

20110519 AIIM Midwest Thirsty Thursday on Social Media
20110519 AIIM Midwest Thirsty Thursday on Social Media20110519 AIIM Midwest Thirsty Thursday on Social Media
20110519 AIIM Midwest Thirsty Thursday on Social Media
 
Insur Tech Adelaide slides
Insur Tech Adelaide slidesInsur Tech Adelaide slides
Insur Tech Adelaide slides
 
AI in Hacking
AI in HackingAI in Hacking
AI in Hacking
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
 
Mirsis Corporate Overview
Mirsis Corporate OverviewMirsis Corporate Overview
Mirsis Corporate Overview
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
 
CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security Trends
 
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
CWIN17 london - how digital identity is fundamentaly enabling business tranfo...
 
2018 IDG Security Priorities Infographic
2018 IDG Security Priorities Infographic2018 IDG Security Priorities Infographic
2018 IDG Security Priorities Infographic
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
 
The Shift to Business Solutions
The Shift to Business SolutionsThe Shift to Business Solutions
The Shift to Business Solutions
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
Presentation bip sidibe group
Presentation bip sidibe groupPresentation bip sidibe group
Presentation bip sidibe group
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
 
Tachyon_Flyer
Tachyon_FlyerTachyon_Flyer
Tachyon_Flyer
 

Similaire à New Research on Security Risks and Blind Spots in Current Identity Management Strategies

New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
Symplified
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheet
Symplified
 

Similaire à New Research on Security Risks and Blind Spots in Current Identity Management Strategies (20)

Infographic: Mobile Identity Management Trends in the Enterprise
Infographic: Mobile Identity Management Trends in the EnterpriseInfographic: Mobile Identity Management Trends in the Enterprise
Infographic: Mobile Identity Management Trends in the Enterprise
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access management
 
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
 
DemandTec case study
DemandTec case studyDemandTec case study
DemandTec case study
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheet
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Mobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in LoyaltyMobile and Digital Innovation in Loyalty
Mobile and Digital Innovation in Loyalty
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
Merit Medical case study
Merit Medical case study Merit Medical case study
Merit Medical case study
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
The Five Pillars of Customer Identity and Access Management (CIAM)
The Five Pillars of Customer Identity and Access Management (CIAM)The Five Pillars of Customer Identity and Access Management (CIAM)
The Five Pillars of Customer Identity and Access Management (CIAM)
 
The Best of Both Worlds: Introducing WSO2 API Manager 4.0.0 [ANZ]
The Best of Both Worlds: Introducing WSO2 API Manager 4.0.0 [ANZ]The Best of Both Worlds: Introducing WSO2 API Manager 4.0.0 [ANZ]
The Best of Both Worlds: Introducing WSO2 API Manager 4.0.0 [ANZ]
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

New Research on Security Risks and Blind Spots in Current Identity Management Strategies

  • 1. New Research: Two-Thirds of Companies Don’t Know What Users Are Doing After Log-in Study of IT Decision-Makers Reveals Security Risks and Operational Flaws with Identity & Access Management Strategies
  • 2. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 2 Symplified IAM Research: Key Findings Businesses today use up to 50 on-premises apps and 25 cloud apps, so identity and access management (IAM) technologies to secure data and deliver user convenience can be critical. But new research from shows many organizations using IAM solutions still don’t know what people are doing while logged into those applications.
  • 3. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 3 Symplified IAM Research: Key Findings 64% of businesses don’t know what users are doing beyond login, whether access is via a computer, mobile device, or both.
  • 4. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 4 Symplified IAM Research: Key Findings 38% experienced unauthorized access 24% experienced a hack exposing user credentials.
  • 5. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 5 Symplified IAM Research: Key Findings “Hacks and accidental data exposure are always a concern, but lack of visibility and control are also a red flag. 86% of the IT pros we surveyed maintain two or more repositories for user identities — a practice that can lead to access and policy violations. BYOD and SaaS used together also present a unique challenge; as employees and partners use more of their own devices, organizations lose visibility into what they’re doing. Know your security, compliance and other specific needs as you build out your identity management strategy.” --Shayne Higdon, CEO and President, Symplified
  • 6. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 6 Who Is Using Corporate Applications Who businesses are connecting to their applications: » 50% authorize at least 250 partners » 54% authorize at least 250 contractors and consultants » 55% authorize 1,500 or more employees » 45% authorize 4,000 or more customers 76% allow employees to access corporate applications via mobile devices; 68% allow partners to do so
  • 7. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 7 Identity Management Trends Across 3 Industries
  • 8. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 8 Trends By Industry Can’t see what users are doing after log-in: Inability to audit user activity can compromise intellectual property and lead to compliance issues
  • 9. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 9 Trends By Industry Experienced unauthorized access:
  • 10. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 10 Trends By Industry Maintain 2 or more repositories for user identities: This practice can lead to access and policy violations
  • 11. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 11 Best Practices
  • 12. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 12 Best Practices: Building An IAM Strategy A proxy-based solution can provide a detailed audit log of what people do while logged into an application, not just when they logged in.
  • 13. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 13 Best Practices: Building An IAM Strategy Explore whether the solution can provide IT with centralized management and control to automatically enforce policies at a granular level.
  • 14. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 14 Best Practices: Building An IAM Strategy Know whether the solution replicates user data in the cloud, which violates some end user agreements and increases the attack surface on sensitive data.
  • 15. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 15 About The Research Symplified commissioned a survey that was conducted between April 25 and May 2, 2013 among 225 IT professionals at US-based companies ranging in size who completed a web- based survey from Qualtrics, Inc. At the 95% confidence level the margin of error is +/6.53 percentage points.
  • 16. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 16 About Symplified Symplified enables IT organizations to simplify user access to applications, regain visibility and control over usage and meet security and compliance requirements. Symplified provides single sign-on, identity and access management, directory integration, centralized provisioning, strong authentication, mobile device support and flexible deployment options. Symplified is headquartered in Boulder, Colorado, and can be found online at www.symplified.com.

Notes de l'éditeur

  1. over a third (38 percent) reported experiencing accidental access by an unauthorized user; and nearly a quarter (24 percent) have experienced a hack exposing user credentials.