Home

Identity and Access Management (IAM) Plans and Practices

Identity and Access Management (IAM) Plans and Practices

What is the state of IAM across organizations?

Which of the following best describes the level of protection for most accounts within your organization:

22%Password and username only
73%Multi-factor authentication (MFA) (e.g., authenticator, magic links, one-time password etc.)
5%Adaptive (based on context, privilege etc)
1%Continuous (constant contextual entity/behavioral monitoring)
0 views
497 responses

On a scale of 1-5, how satisfied are you with the state of IAM within your organization, with 1 being completely unsatisfied and 5 being completely satisfied.

4%1 - Completely unsatisfied
15%2
38%3 - Neutral
37%4
6%5 - Completely satisfied
0 views
496 responses

Other than reducing cybersecurity risk, what is the single most critical reason to have a strong organization-wide IAM strategy?

19%Increased compliance
33%Scalability of security strategy
18%Reduced burden on end users
23%Ability to unify/automate provisioning and deprovisioning
8%Reduced burden on IT teams
0%Other
0 views
495 responses

Do you have a single IAM solution, multiple IAM tools, or no IAM solution?

38%Single solution
52%Multiple IAM tools
10%No IAM solution
0 views
492 responses

How many IAM tools do you currently use for security, control, and customization of any collaboration done with your customers and business partners?

64%2-3
32%4-5
4%More than 5
0 views
253 responses

What best describes your current IAM infrastructure:

13%On prem
23%Mostly private cloud-based
26%Mostly public cloud-based
33%Hybrid cloud-based
5%N/A
0 views
490 responses

What end-user facing tools are you focussed on adding over the next 12 months? (Select all that apply)

47%MFA
55%Single sign-on
33%Biometric authentication
20%Social authentication
22%Hardware security modules (HSMs)
15%None of these
0%Other
0 views
488 responses

What kinds of tools/features are you most focussed on adding regarding the back-end of your IAM strategy? Select all that apply (scroll down for more options)

51%Security information and event management (SIEM)
53%Privileged access management (PAM)
37%Security orchestration, automation, and response (SOAR)
42%Mobile device management (MDM)
28%Web application firewall
23%Cloud access security broker (CASB)
15%Graphical user interface (GUI)
20%Digital certificates
34%VPNs
20%Public key infrastructure (PKI)
37%Endpoint security
19%User and entity behavior analytics (UEBA)
3%None of these
0%Other
0 views
488 responses

What are the top reasons organizations struggle to implement a successful IAM strategy? Select all that apply (scroll down for more options)

36%End-user/employee buy-in
44%Business executive buy-in
38%Tools can’t keep up with changing threat landscape
38%End-user personal device management
51%Integration issues
40%Lack of budget
43%Lack of skilled technical staff
23%Tools not performing as advertised
1%None of these
0%Other
0 views
485 responses

How has your IAM budget changed over the past 12 months?

28%No change
30%1-5% increase
23%6-10% increase
9%11-15% increase
3%16-20% increase
4%>20% increase
2%It decreased
0 views
484 responses

Are you expecting your IAM budget to increase in the next 12 months?

6%Yes, significant increase
35%Yes, moderate increase
35%Yes, slight increase
24%No change
1%No, it will decrease
0 views
484 responses

Did your IAM strategy change as a result of the COVID-19 pandemic and subsequent work from home policy?

13%Yes, significantly
42%Yes, moderately
24%Yes, slightly
21%No change
0 views
484 responses