New Research: Two-Thirds ofCompanies Don’t Know WhatUsers Are Doing After Log-inStudy of IT Decision-Makers Reveals Securi...
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 2Symplified IAM Research: Key FindingsBusinesses today use...
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 3Symplified IAM Research: Key Findings64% of businessesdon...
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 4Symplified IAM Research: Key Findings38% experiencedunaut...
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 5Symplified IAM Research: Key Findings“Hacks and accidenta...
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 6Who Is Using Corporate ApplicationsWho businesses are con...
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 7Identity ManagementTrends Across 3 Industries
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 8Trends By IndustryCan’t see what users are doing after lo...
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 9Trends By IndustryExperienced unauthorized access:
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 10Trends By IndustryMaintain 2 or more repositories for us...
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 11Best Practices
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 12Best Practices: Building An IAM StrategyA proxy-based so...
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 13Best Practices: Building An IAM StrategyExplore whether ...
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 14Best Practices: Building An IAM StrategyKnow whether the...
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 15About The ResearchSymplified commissioned a survey that ...
CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 16About SymplifiedSymplified enables IT organizations to s...
Upcoming SlideShare
Loading in …5
×

New Research on Security Risks and Blind Spots in Current Identity Management Strategies

466 views

Published on

Symplified surveyed IT executives and administrators to uncover security and operational flaws putting their corporate networks, user data and IP at risk.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
466
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • over a third (38 percent) reported experiencing accidental access by an unauthorized user; and nearly a quarter (24 percent) have experienced a hack exposing user credentials.
  • New Research on Security Risks and Blind Spots in Current Identity Management Strategies

    1. 1. New Research: Two-Thirds ofCompanies Don’t Know WhatUsers Are Doing After Log-inStudy of IT Decision-Makers Reveals Security Risks andOperational Flaws with Identity & Access ManagementStrategies
    2. 2. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 2Symplified IAM Research: Key FindingsBusinesses today use up to 50 on-premises apps and 25 cloudapps, so identity and access management (IAM) technologiesto secure data and deliver user convenience can be critical.But new research from shows manyorganizations using IAM solutions still don’t know what peopleare doing while logged into those applications.
    3. 3. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 3Symplified IAM Research: Key Findings64% of businessesdon’t know whatusers are doingbeyond login,whether access is viaa computer, mobiledevice, or both.
    4. 4. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 4Symplified IAM Research: Key Findings38% experiencedunauthorized access24% experienced a hackexposing usercredentials.
    5. 5. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 5Symplified IAM Research: Key Findings“Hacks and accidental data exposure are always a concern, butlack of visibility and control are also a red flag. 86% of the ITpros we surveyed maintain two or more repositories for useridentities — a practice that can lead to access and policyviolations. BYOD and SaaS used together also present a uniquechallenge; as employees and partners use more of their owndevices, organizations lose visibility into what they’re doing.Know your security, compliance and other specific needs asyou build out your identity management strategy.”--Shayne Higdon, CEO and President, Symplified
    6. 6. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 6Who Is Using Corporate ApplicationsWho businesses are connecting to their applications:» 50% authorize at least 250 partners» 54% authorize at least 250 contractors and consultants» 55% authorize 1,500 or more employees» 45% authorize 4,000 or more customers76% allow employees to access corporate applications viamobile devices; 68% allow partners to do so
    7. 7. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 7Identity ManagementTrends Across 3 Industries
    8. 8. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 8Trends By IndustryCan’t see what users are doing after log-in:Inability to audit user activitycan compromise intellectualproperty and lead to complianceissues
    9. 9. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 9Trends By IndustryExperienced unauthorized access:
    10. 10. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 10Trends By IndustryMaintain 2 or more repositories for user identities:This practice can lead to accessand policy violations
    11. 11. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 11Best Practices
    12. 12. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 12Best Practices: Building An IAM StrategyA proxy-based solution can provide a detailed audit log of whatpeople do while logged into an application, not just when theylogged in.
    13. 13. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 13Best Practices: Building An IAM StrategyExplore whether the solution can provide IT with centralizedmanagement and control to automatically enforce policies at agranular level.
    14. 14. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 14Best Practices: Building An IAM StrategyKnow whether the solution replicates user data in the cloud,which violates some end user agreements and increases theattack surface on sensitive data.
    15. 15. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 15About The ResearchSymplified commissioned a survey that was conductedbetween April 25 and May 2, 2013 among 225 IT professionalsat US-based companies ranging in size who completed a web-based survey from Qualtrics, Inc. At the 95% confidence levelthe margin of error is +/6.53 percentage points.
    16. 16. CONFIDENTIAL »©2013 SYMPLIFIED » symplified.com » @symplified » 16About SymplifiedSymplified enables IT organizations to simplify user access toapplications, regain visibility and control over usage and meetsecurity and compliance requirements. Symplified providessingle sign-on, identity and access management, directoryintegration, centralized provisioning, strong authentication,mobile device support and flexible deployment options.Symplified is headquartered in Boulder, Colorado, and can befound online at www.symplified.com.

    ×