Key Findings: One Identity Assessment of Identity and Access Management in 2018

Key Findings: One Identity Assessment of Identity and Access Management in 2018

Yesterday, identity and access management solution provider One Identity Released the results of their Assessment of Identity and Access Management in 2018 study. This global research polled more than 1,000 enterprise-level IT security professionals on their challenges and fears in IAM and PAM deployment. Through their research, One Identity discovered widespread identity security implementation failures in enterprises around the world.

Identity security failures and privileged access management failures can both result in database exposure. The key findings from the One Identity Assessment of Identity and Access Management in 2018 include:

  • 31% of enterprises rely on outdated processes (including manual methods and spreadsheets) to manage their privileged and/or superuser credentials.
  • 5% of enterprises have no way of knowing if user accounts retain their permissions after undergoing offboarding.
  • 68% of IT professionals said it takes at least 5 minutes to unlock a user account if the password is lost or forgotten.  
  • 9% admit password resetting often takes more than 30 minutes, cutting into productive workdays.
  • 32% of enterprises take somewhere between several days to multiple weeks to deprovision former users during the offboarding process.
  • 44% of enterprises take several days to multiple weeks to complete the onboarding process.    
  • 77% of IT professionals said it would easy to steal valuable digital assets and information if they were to leave their enterprise.
  • 12% admitted they would if they were sufficiently upset at their enterprise.

You can download the full One Identity Assessment of Identity and Access Management in 2018 study here.

Other Resources: 

The 10 Best Privileged Access Management Platforms of 2018

The 10 Coolest IAM and Identity Security CEO Leaders

Privileged Access Credentials (With Identity Automation)

The Importance of Edge Use Access (With Identity Automation)

Managing Third-Party Privileges with Identity Automation

IAM vs CIAM: What’s the Difference?

The Role of Identity in Digital Transformation

The Current State of Biometric Authentication in IAM

Comparing the Top Identity and Access Management Solutions

The 32 Best Identity and Access Management Platforms for 2018

 

Ben Canner

Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.
Ben Canner