How would you rate your current processes for managing/governing machine identities (API tokens, service accounts, etc)?

Very effective5%

Effective38%

Somewhat effective26%

Somewhat ineffective18%

Ineffective11%

Very ineffective3%

Unsure

66 PARTICIPANTS
340 viewscircle icon1 Comment
Sort by:
CISO in Software9 months ago

What is the most popular solution in this space that most people are using?

Lightbulb on1

Content you might like

Ransomware and multifaceted extortion33%

Business email compromise40%

Third-party vendor compromise (supply chain)17%

Cloud security incidents7%

I have no idea1%

View Results

We don’t yet have a governance framework26%

We use manual checks or periodic reviews37%

We have defined policies and guidelines for the creation and deployment of agents, which each team ensures independently30%

We have introduced a platform to centrally manage policies, versions, and monitoring of agents4%

None of the above4%

View Results