Your SlideShare is downloading. ×
0
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
New Research on Security Risks and Blind Spots in Current Identity Management Strategies
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

New Research on Security Risks and Blind Spots in Current Identity Management Strategies

235

Published on

Symplified surveyed IT executives and administrators to uncover security and operational flaws putting their corporate networks, user data and IP at risk.

Symplified surveyed IT executives and administrators to uncover security and operational flaws putting their corporate networks, user data and IP at risk.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
235
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • over a third (38 percent) reported experiencing accidental access by an unauthorized user; and nearly a quarter (24 percent) have experienced a hack exposing user credentials.
  • Transcript

    • 1. New Research: Two-Thirds ofCompanies Don’t Know WhatUsers Are Doing After Log-inStudy of IT Decision-Makers Reveals Security Risks andOperational Flaws with Identity & Access ManagementStrategies
    • 2. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 2Symplified IAM Research: Key FindingsBusinesses today use up to 50 on-premises apps and 25 cloudapps, so identity and access management (IAM) technologiesto secure data and deliver user convenience can be critical.But new research from shows manyorganizations using IAM solutions still don’t know what peopleare doing while logged into those applications.
    • 3. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 3Symplified IAM Research: Key Findings64% of businessesdon’t know whatusers are doingbeyond login,whether access is viaa computer, mobiledevice, or both.
    • 4. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 4Symplified IAM Research: Key Findings38% experiencedunauthorized access24% experienced a hackexposing usercredentials.
    • 5. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 5Symplified IAM Research: Key Findings“Hacks and accidental data exposure are always a concern, butlack of visibility and control are also a red flag. 86% of the ITpros we surveyed maintain two or more repositories for useridentities — a practice that can lead to access and policyviolations. BYOD and SaaS used together also present a uniquechallenge; as employees and partners use more of their owndevices, organizations lose visibility into what they’re doing.Know your security, compliance and other specific needs asyou build out your identity management strategy.”--Shayne Higdon, CEO and President, Symplified
    • 6. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 6Who Is Using Corporate ApplicationsWho businesses are connecting to their applications:» 50% authorize at least 250 partners» 54% authorize at least 250 contractors and consultants» 55% authorize 1,500 or more employees» 45% authorize 4,000 or more customers76% allow employees to access corporate applications viamobile devices; 68% allow partners to do so
    • 7. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 7Identity ManagementTrends Across 3 Industries
    • 8. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 8Trends By IndustryCan’t see what users are doing after log-in:Inability to audit user activitycan compromise intellectualproperty and lead to complianceissues
    • 9. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 9Trends By IndustryExperienced unauthorized access:
    • 10. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 10Trends By IndustryMaintain 2 or more repositories for user identities:This practice can lead to accessand policy violations
    • 11. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 11Best Practices
    • 12. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 12Best Practices: Building An IAM StrategyA proxy-based solution can provide a detailed audit log of whatpeople do while logged into an application, not just when theylogged in.
    • 13. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 13Best Practices: Building An IAM StrategyExplore whether the solution can provide IT with centralizedmanagement and control to automatically enforce policies at agranular level.
    • 14. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 14Best Practices: Building An IAM StrategyKnow whether the solution replicates user data in the cloud,which violates some end user agreements and increases theattack surface on sensitive data.
    • 15. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 15About The ResearchSymplified commissioned a survey that was conductedbetween April 25 and May 2, 2013 among 225 IT professionalsat US-based companies ranging in size who completed a web-based survey from Qualtrics, Inc. At the 95% confidence levelthe margin of error is +/6.53 percentage points.
    • 16. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 16About SymplifiedSymplified enables IT organizations to simplify user access toapplications, regain visibility and control over usage and meetsecurity and compliance requirements. Symplified providessingle sign-on, identity and access management, directoryintegration, centralized provisioning, strong authentication,mobile device support and flexible deployment options.Symplified is headquartered in Boulder, Colorado, and can befound online at www.symplified.com.

    ×