Key Findings: One Identity Assessment of Identity and Access Management in 2018
Yesterday, identity and access management solution provider One Identity Released the results of their Assessment of Identity and Access Management in 2018 study. This global research polled more than 1,000 enterprise-level IT security professionals on their challenges and fears in IAM and PAM deployment. Through their research, One Identity discovered widespread identity security implementation failures in enterprises around the world.
Identity security failures and privileged access management failures can both result in database exposure. The key findings from the One Identity Assessment of Identity and Access Management in 2018 include:
- 31% of enterprises rely on outdated processes (including manual methods and spreadsheets) to manage their privileged and/or superuser credentials.
- 5% of enterprises have no way of knowing if user accounts retain their permissions after undergoing offboarding.
- 68% of IT professionals said it takes at least 5 minutes to unlock a user account if the password is lost or forgotten.
- 9% admit password resetting often takes more than 30 minutes, cutting into productive workdays.
- 32% of enterprises take somewhere between several days to multiple weeks to deprovision former users during the offboarding process.
- 44% of enterprises take several days to multiple weeks to complete the onboarding process.
- 77% of IT professionals said it would easy to steal valuable digital assets and information if they were to leave their enterprise.
- 12% admitted they would if they were sufficiently upset at their enterprise.
You can download the full One Identity Assessment of Identity and Access Management in 2018 study here.
Other Resources:
The 10 Best Privileged Access Management Platforms of 2018
The 10 Coolest IAM and Identity Security CEO Leaders
Privileged Access Credentials (With Identity Automation)
The Importance of Edge Use Access (With Identity Automation)
Managing Third-Party Privileges with Identity Automation
IAM vs CIAM: What’s the Difference?
The Role of Identity in Digital Transformation
The Current State of Biometric Authentication in IAM
Comparing the Top Identity and Access Management Solutions
The 32 Best Identity and Access Management Platforms for 2018
Widget not in any sidebars