Home

Identity and Access Management (IAM) Plans and Practices

Identity and Access Management (IAM) Plans and Practices

What is the state of IAM across organizations?

Which of the following best describes the level of protection for most accounts within your organization:

21%Password and username only
74%Multi-factor authentication (MFA) (e.g., authenticator, magic links, one-time password etc.)
4%Adaptive (based on context, privilege etc)
1%Continuous (constant contextual entity/behavioral monitoring)
0 views
465 responses

On a scale of 1-5, how satisfied are you with the state of IAM within your organization, with 1 being completely unsatisfied and 5 being completely satisfied.

4%1 - Completely unsatisfied
13%2
38%3 - Neutral
39%4
6%5 - Completely satisfied
0 views
464 responses

Other than reducing cybersecurity risk, what is the single most critical reason to have a strong organization-wide IAM strategy?

20%Increased compliance
33%Scalability of security strategy
16%Reduced burden on end users
23%Ability to unify/automate provisioning and deprovisioning
9%Reduced burden on IT teams
0%Other
0 views
463 responses

Do you have a single IAM solution, multiple IAM tools, or no IAM solution?

38%Single solution
52%Multiple IAM tools
10%No IAM solution
0 views
461 responses

How many IAM tools do you currently use for security, control, and customization of any collaboration done with your customers and business partners?

67%2-3
29%4-5
4%More than 5
0 views
237 responses

What best describes your current IAM infrastructure:

14%On prem
20%Mostly private cloud-based
26%Mostly public cloud-based
35%Hybrid cloud-based
5%N/A
0 views
459 responses

What end-user facing tools are you focussed on adding over the next 12 months? (Select all that apply)

50%MFA
54%Single sign-on
31%Biometric authentication
18%Social authentication
21%Hardware security modules (HSMs)
16%None of these
0%Other
0 views
457 responses

What kinds of tools/features are you most focussed on adding regarding the back-end of your IAM strategy? Select all that apply (scroll down for more options)

53%Security information and event management (SIEM)
52%Privileged access management (PAM)
34%Security orchestration, automation, and response (SOAR)
43%Mobile device management (MDM)
28%Web application firewall
24%Cloud access security broker (CASB)
15%Graphical user interface (GUI)
20%Digital certificates
35%VPNs
20%Public key infrastructure (PKI)
38%Endpoint security
20%User and entity behavior analytics (UEBA)
3%None of these
0%Other
0 views
457 responses

What are the top reasons organizations struggle to implement a successful IAM strategy? Select all that apply (scroll down for more options)

37%End-user/employee buy-in
44%Business executive buy-in
35%Tools can’t keep up with changing threat landscape
37%End-user personal device management
52%Integration issues
42%Lack of budget
45%Lack of skilled technical staff
23%Tools not performing as advertised
1%None of these
0%Other
0 views
455 responses

How has your IAM budget changed over the past 12 months?

29%No change
32%1-5% increase
21%6-10% increase
8%11-15% increase
3%16-20% increase
4%>20% increase
2%It decreased
0 views
454 responses

Are you expecting your IAM budget to increase in the next 12 months?

6%Yes, significant increase
33%Yes, moderate increase
36%Yes, slight increase
25%No change
1%No, it will decrease
0 views
454 responses

Did your IAM strategy change as a result of the COVID-19 pandemic and subsequent work from home policy?

13%Yes, significantly
40%Yes, moderately
26%Yes, slightly
22%No change
0 views
454 responses