• Solutions Review Sites
    • About Us
    • Application Development
    • Backup & Recovery
    • Business Intelligence
    • BPM
    • Content Management
    • CRM
    • Data Integration
    • Data Management
    • Data Storage
    • Endpoint Security
    • Enterprise Cloud Strategy
    • ERP
    • Identity Management
    • Marketing Automation
    • Mobility Management
    • Network Monitoring
    • SIEM
    • Talent Management
    • Wireless Network
  • **NEW** Get MACHINE-MATCHED to IAM Solutions

Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services

Link to Identity and Access Management Buyers Guide

Menu

  • News
  • Best Practices
  • Best Selling Books
  • Solutions Directories
    • Identity and Access Management
    • Privileged Access Management
    • Identity Governance & Administration
    • Biometric Authentication
  • Buyer’s Guides
    • Identity & Access Management
    • Privileged Access Management
    • Identity Governance & Administration
    • Biometric Authentication
  • Vendor Map
  • Resources
  • Contact Us

By The Numbers: Privileged Access Management

Posted on August 31, 2017 by Jeff Edwards in Best Practices

By-the-numbers-backdrop

It’s been proven time and time again: unmanaged, unmonitored privileged accounts are an easy target for both external attacks and malicious insiders— just take a look at some recent data breaches and chances are high the malicious party used a compromised privileged account to increase their permissions.

IAM Solution Suggestion Engine

Due to this common practice Privileged Access Management (PAM)— the monitoring and protection of super user accounts— has emerged as one of the most important aspects of Identity and Access Management (IAM) , and cyber security writ large, today.

Despite this, it can be difficult to get those in decision-making positions to allocate resources for a full-fledged Privileged Access Management Initiative, so where can you start?

Compare Top PAM Vendors with the 2017 PAM Buyer’s Guide

  • A Side-by-Side Comparison of The Top 10 Privileged Access Management Vendors
  • Key Capabilities Reference for PAM Solutions
  • A Category Overview and “Bottom Line” Analysis
  • Free Resource
Download

One surefire way to understand (or make someone else understand) the importance of securing privileged accounts is to start with cold hard facts. By assessing current statistics and those projected for the future we can get a good sense of both the need for privileged account management and where the market is headed.

We’ve gathered a number of statistics for leading research and surveys that demonstrate the extent to which privileged access management can impact organizational security, and how the market will change and grow in the coming years.

For starters, according to Forrester Research’s most recent Wave report on Privileged Access Management:

  • 80% of security breaches involve privileged credentials.

And those breaches aren’t just a flash in the pan, according to Verizon’s 2017 Data Breach Investigations Report (DBIR), which found that:

  • 82% of data breaches caused by insider misuse took over a week to detect, up from 70% in 2016.

Those numbers are disastrous, and security professionals are taking note, according to The 2016 State of Privileged Account Management Report from Thycotic and  Cybersecurity Ventures:

  • 80% of IT security professionals consider Privileged Account Management security a high priority.
  • 60% of IT security professionals Indicate that PAM security is required to demonstrate compliance with government regulations.

However, public sector employees seem to be lagging behind in their adoption of PAM solutions, according to recent research from Tripwire Inc. and Dimensional Research:

  • 30% of federal government respondents to Tripwire’s survey disclosed they are not able to detect every non-privileged user’s attempt to access files.
  • Despite this, 73% of federal government respondents assume their system would generate an alert or email within hours if a user inappropriately accessed file shares.

But perhaps public sectors should pay more attention, because according to the Verizon’s 2016 DBIR:

  • The public sector reported more security incidents than any other industry in 2015 with privileged access misuse and non-malicious events making up nearly half (46%) of the reported incidents.

That’s a lot of damage. So what are organizations doing to mitigate that risk? Shockingly little, according to Thycotic’s 2016 State of PAM report, which found that:

  • 66% of organizations still rely on manual methods to manage privileged accounts.
  • Just 10% of organizations have implemented an automated security vendor solution.
  • 20% of organizations have never changed their default passwords on privileged accounts.
  • 30% of organizations allow accounts and passwords to be shared.
  • 40% of organizations use the same security for privileged accounts as standard accounts.
  • 70% of organizations do not require approval for creating new privileged accounts.
  • 50% of organizations do not audit privileged accounts.

Despite these disheartening numbers, things seem to be trending in the right direction, at least so far as government regulation goes.

By the end of 2017, more stringent regulations around control of privileged access will lead to a rise of 40% in fines and penalties imposed by regulatory bodies on organizations with deficient PAM controls that have been breached, according to Gartner Inc.’s 2015 Market Guide for PAM.

By 2018, Garter predicts that 50% of organizations will use authentication methods other than passwords for administrative access, up from 20% in 2015.

Download Link to Privileged Access Management Buyer's Guide

And watch this for the 10 Best Resources for Evaluating IAM solutions:

  • Author
  • Recent Posts
Jeff Edwards
Follow Jeff
Jeff Edwards
Editor, Cybersecurity at Solutions Review
Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large.He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
Jeff Edwards
Follow Jeff
Latest posts by Jeff Edwards (see all)
  • 17 Cybersecurity Podcasts You Should Listen to in 2020 - January 3, 2019
  • What’s Changed: Gartner 2017 Magic Quadrant for Identity Governance and Administration (IGA) - January 28, 2018
  • Crossmatch Integrates Keyboard Capture to Identity Management Software - November 27, 2017

Share this:

  • LinkedIn
  • Twitter
  • Facebook

Related

Tagged
  • By the Numbers
  • Forrester
  • Gartner
  • Lists
  • PAM
  • PIM
  • Privileged Access Management
  • Privileged Account Management
  • Privileged Identity Management

Post navigation

Previous Previous post: Security Spending to hit $93B by 2018, Gartner Says
Next Next post: ForgeRock Closes $88M in Series D Funding
IAM Solution Suggestion Engine


Download link to Identity Access Management Buyer's Guide

ManageEngine Ad
Optimal IdM Ad

Vendor Map Report Identity ManagementDownload link to Identity Access Management Vendor Map

Top Posts & Pages

  • The 10 Best Free and Open-Source Identity Management Tools
    The 10 Best Free and Open-Source Identity Management Tools
  • The 30 Best Identity Management Companies For 2020
    The 30 Best Identity Management Companies For 2020
  • The Top Seven Password Attack Methods (And How to Prevent Them)
    The Top Seven Password Attack Methods (And How to Prevent Them)
  • Best Identity Management Solutions Vendors, Companies, Software, Tools | Solutions Review
    Best Identity Management Solutions Vendors, Companies, Software, Tools | Solutions Review
  • Identity and Access Management Solutions Directory
    Identity and Access Management Solutions Directory
  • Get a Free Identity & Access Management Buyer's Guide
    Get a Free Identity & Access Management Buyer's Guide
  • The Highest-Rated Books for Identity Management Engineers to Read
    The Highest-Rated Books for Identity Management Engineers to Read

Featured Video

Download link to SIEM Buyer's Guide

Identity & Access Management Solutions
Solutions Review brings all of the technology news, opinion, best practices and industry events together in one place. Every day our editors scan the Web looking for the most relevant content about Identity & Access Management and posts it here.

Related Solutions Review Sites

  • SIEM | Information Security
  • Endpoint Protection
  • Backup and Recovery
  • Mobile Device Management
  • twitter
  • facebook
  • linkedin
  • youtube
  • email
My Tweets

Free IAM Buyer’s Guide

Download link to Identity Access Management Buyer's Guide
© 2012-2022 Solutions Review. All rights reserved.
Solutions Review - Identity and Access Management | Privacy Policy | Do Not Sell My Info
Top
 

Loading Comments...