SlideShare a Scribd company logo
The Growing Cloud Identity
Crisis:
A Detailed Survey Report on Cloud-Based
Solutions for IAM and SSO
Executive Summary
Background
	 Terms and Definitions
	 About the Research
Managing Access to Cloud Applications
Top Challenges of Cloud Application Access
	 The Most Important Features for Cloud Application Access
The Current IAM Market
IAM Is Gaining Widespread Adoption
Existing IAM Deployments
The Most Valued IAM Functionality
Public and Private Cloud Support within IAM
Single Sign-On and Cloud-Based Applications
Single Sign-On Is in Demand
SSO Solutions Are Working
	 Cloud Applications Appear to be Driving SSO Adoption
SSO Adoption Is Growing
The IAM Market Direction
IAM Is a High Priority Purchase
Security and Trust Are the Most Critical Features
	 Price and Trust Drive Vendor Selection
Industry Focus: Financial Services and Compliance
Concerns
Industry Focus: Manufacturing Moves to the Cloud
Summary
Appendix: Supporting the IAM Purchase Process
2
Table of Contents
3
4
6
11
14
18
20
21
23
24
The Growing Cloud Identity Crisis
This report highlights the results of research conducted by Gemalto, makers of CloudEntr, in
conjunction with 451 Research in October 2013. The survey captured results from IT decision-
makers in North American companies with a specific focus on the Identity and Access Management
(IAM) market and its growing role in securing access to cloud-based applications.
The data reveals an IAM market in transition, in large part due to the increase in cloud-based
applications. As companies increase their reliance on cloud-based applications, they face growing
challenges in managing access to those applications.
Although the IAM market is well established, with almost half of respondents already having an
IAM solution in place, it’s still in flux as well.
Single Sign-On (SSO) solutions are gaining traction at the same time. The more hosted applications
a business uses, the more likely they are to have deployed an SSO solution. The continued growth
of cloud-based business applications is most likely fueling the additional growth and interest in
cloud-based SSO.
Finally, security and trust in the vendor are the most important factors in choosing IAM solutions
and vendors. Businesses are looking for a strong reputation and solid support policies, as well as
pricing that meets their needs.
3
	 > Security is the top concern when it comes to managing access to cloud-based
applications. The #1 challenge named by survey respondents was “preventing
security breaches.”
	 > Many businesses are looking for strong authentication solutions as a way to reduce 	
the risks of cloud-based application access. Managing mobile access is also critical 	
	 for all but the largest of the companies.
	 > Almost 30 percent of respondents were in the process of evaluating or deploying 	
	 new IAM solutions.
	 > When it comes to IAM solutions, businesses are looking for security and the ability 	
	 to handle access from multiple devices and locations. Businesses in regulated 		
	 industries (healthcare, financial services) are particularly interested in enforcing 	
	 company policies.
Executive Summary
The Growing Cloud Identity Crisis
4
Cloud computing presents new challenges for the enterprise. IT organizations are suddenly
responsible for managing access to cloud-based applications that reside outside the enterprise
firewalls. They have the same levels of responsibility for securing access to cloud-based
applications as on-premise apps, but without the same level of control.
Many organizations already have processes and technologies for managing authentication
and access to their on-premise applications. A mature Identity and Access Management (IAM)
marketplace addresses these needs quite well. But with the advent of cloud computing, the market
is being stretched to address the needs of securing access to cloud-based applications. The
growing need comes from both ends of the market:
The survey was designed to deliver a better understanding of what’s happening in this market,
which is characterized both by mature on-premise solutions and a growing number of new cloud-
based participants.
Terms and Definitions
Identity and Access Management (IAM) solutions facilitate the management and automation
of user access to systems or applications within an organization. They typically manage user
authentication (ascertaining user identity), authorization (what privileges they have), and
application access.
Single Sign-On (SSO) solutions address the authentication part of the IAM puzzle. They simplify
access to multiple diverse applications by consolidating application access from a single login.
Once authenticated with the SSO solution, the user does not have to enter an account and password
to access the downstream applications – the SSO solution manages authentication. SSO may be
a feature of a comprehensive IAM solution. Stand-alone SSO solutions may integrate with IAM
solutions to exchange information about user identity and authorization levels.
>	 Companies with established IAM solutions need to extend those practices and 		
capabilities to handle the growing number of cloud-based applications their 	 	
	 business users access.
> Small or growing companies often have no in-house IAM solutions and rely heavily 	
on cloud-based applications. These represent new potential participants in the IAM 	
market.
Background
The Growing Cloud Identity Crisis
5
About the Research
In October 2013, Gemalto, in conjunction with 451 Research, conducted a survey of North American
IT decision-makers and influencers about their use of Identity and Access Management solutions
and single sign-on (SSO) solutions. More than two hundred respondents, across all industry
sectors, responded to the survey. Titles included IT directors and managers, security executives
(CSOs, compliance managers), and line of business executives with security mandates.
For many of the questions, respondents were asked to rate the importance of different factors or
features on a scale of 1 to 10, with 10 being “very important.” In some of the results, we report the
consensus estimate of importance, which in this case is the answer averaged over all respondents
in the categories.
In some cases, the sample sizes are too small to report statistically significant findings –
particularly when drilling down by industry. And almost 30% of the respondents fell outside of
the defined categories, answering “Other” for their industry. However, we have called out several
instances in which meaningful industry differences appear in the data.
Background
The Growing Cloud Identity Crisis
Number of hosted applications reportedly used, by business size
0 10 20 30 40 50
5
6 to 10
11 to 15
16 to 20
20>
>
Over 5,000
1001-5000
101-1000
Company Size
6
One of the biggest changes to the enterprise IT environment in recent years has been the growth of
cloud-based applications. Even those organizations with established IAM solutions for on-premise
applications must now figure out how to manage employee and contractor access to cloud-based
or hosted applications.
To avoid the complications of cloud, the survey simply asked respondents about how many “hosted
applications” the business used. Although you might expect cloud adoption to be more pervasive in
the smaller businesses, the research showed that many of the larger businesses (with more than
5000 employees) use more than 20 hosted applications.
Top Challenges of Cloud Application Access
The survey asked respondents about which challenges were relevant to their company when it
came to managing secure access to cloud-based applications. Respondents could select all of
the cloud access security challenges that applied. The clear leader in challenges was the issue of
preventing security breaches.
Managing Access to Cloud Applications
The Growing Cloud Identity Crisis
7
It comes as no surprise in today’s environment that preventing security breaches would be top of
mind. But recall that this survey was taken in October of 2013 – before the Target data breach, the
Marriot and Niemen Marcus breaches, and the Senate hearings and subsequent press coverage.
When asked to identify the single biggest challenge when it comes to secure access to cloud-based
applications, the overwhelming concern is preventing security breaches. Regulatory compliance,
which was eighth on the list above, is second on the list when companies can choose only one
challenge. This highlights industry differences – for many businesses in regulated industries,
regulatory compliance is the most important issue.
Managing Access to Cloud Applications
Challenges of Managing Secure Access to Cloud Apps
0% 10% 20% 30% 40% 50% 60% 70%
Administrative workload reduction
Managing (BYOD)
Improving end user experience
Regulatory compliance and audit
Control over SaaS applications
Application of company policy
Transparent access management
Revoking access of users
Password policy enforcement
Assigning access to users
Preventing security breaches
The Growing Cloud Identity Crisis
8
Respondents from organizations with more than 1,000 employees tended to give more weight to
administrative workload reduction and controlling SaaS applications. Businesses with more than
5,000 employees were more concerned with “application of company policy” as a challenge for
cloud-based applications.
Managing Access to Cloud Applications
Which one of the following is the biggest challenge in your company in
terms of managing secure access to cloud-based applications?
30%
25%
20%
15%
10%
5%
0%
Preventing security breaches Regulatory compliance
& audit
Assigning access to users
(employees and contractors)
Transparent access management
(who has access to what)
The Growing Cloud Identity Crisis
1 2 3 4 5 6 7 8 9 10
Reporting and analytics
Mobile access
Single Sign-On
Authentication methods
Authentication policy management
Ease of provisioning
Password manager
Strong authentication
How would you rate the importance of each of the following for
managing secure access to cloud-based applications? (consensus estimate):
9
The Most Important Features for Cloud Application Access
The survey participants identified a wide range of features that they felt were critical to addressing
the challenges above. The most highly ranked feature was strong authentication.
Managing Access to Cloud Applications
0% 10% 20% 30% 40% 50% 60% 70%
Admin workload reduction
Over 5000 1001-5000 101-1000
Involving end user experience
Managing (BYOD)
Preventing security breaches
Control over SaaS apps
Regulatory compliance and audit
Application of company policy
Password policy enforcement
Transparent access mgmt.
Revoking access
Assigning access
Don’t know
Company Size
The Growing Cloud Identity Crisis
10
While strong authentication is the clear leader, it’s worth noting that the rest of the responses are
fairly tightly clustered – nearly everything is important.
Reporting and Analytics rank lowest for the group of respondents as a whole; only 36% of the
respondents said it was very important (a 9 or 10 on the scale of 1 to 10). But in the financial
services industry, 53% of the respondents said that Reporting and Analytics were very important.
Company size also affected the relative importance of the different features. For example, mobile
access was less important for companies larger than 5,000. It’s unclear why this should be true
– perhaps those larger companies imagine that BYOD policies about using mobile devices were
enough, or perhaps the workforce patterns are different among these very large companies. The
lower ratings from the companies greater than 5,000 may have brought down the overall weighted
importance of mobile access across the respondents as a whole.
Managing Access to Cloud Applications
1 2 3 4 5 6 7 8 9 10
0%
Importance of Mobile Access features for managing secure access to
cloud-based applications, by company size:
Over 5000 1001-5000 101-1000
5%
10%
15%
20%
25%
30%
Company Size
The Growing Cloud Identity Crisis
11
The business IT landscape is changing, with the corporate perimeter disappearing. This has
significant implications for Identity and Access Management practices. At the enterprise level,
many businesses are adopting cloud-based applications, while small and mid-sized businesses are
embracing cloud-based applications to delegate IT overhead and responsibilities. As the research
highlights, the more of these cloud-based applications businesses use, the greater their need for
IAM and SSO capabilities that reach beyond the on-premise perimeter to manage user identity and
application access in the cloud.
The survey data reveals an IAM market that is both mature and in transition at the same time.
Although many companies already have IAM solutions, a large number are also in the process of
testing, evaluating or deploying IAM solutions.
IAM Is Gaining Widespread Adoption
When asked whether or not they had an IAM solution already, the data reveals a mix of existing
implementations (maturity) and new deployments and evaluations (change and disruption).
The Current IAM Market
> Nearly half of the respondents already had an IAM solution.
> Another 30% planned to either deploy or evaluate/test IAM in the next six months
Does your company currently use any Identity and Access Management solutions?
Yes, have IAM
Will deploy in 6 months
Plan to test/evaluate
within 6 months
No plans
Don’t know
No Answer
48%
16%
14%
14%
6%
1%
The Growing Cloud Identity Crisis
12
While a 50% deployment would indicate a fairly mature industry, the large number of evaluations
means that conditions are changing in such a way as to spur significant adoption. The increasing
uptake in cloud-based applications is no doubt part of that change.
Existing IAM Deployments
Adoption of IAM was fairly consistent across the range of company sizes. But adoption varied by
industry, with the greatest deployments in technology (hardware and software) industries, as well
as financial services.
When asked to name their existing IAM solutions, respondents tended to list on-premise IAM
solutions from Microsoft (including Active Directory), IBM, CA, Oracle, and others. The cloud-based
IAM solutions were mostly missing from the existing deployments. Cloud-based IAM solutions may
be driving newer deployments planned in the coming months.
The Most Valued IAM Functionality
When asked about the most important attributes of an IAM solution, security and convenience were
the main themes.
The Current IAM Market
1 2 3 4 5 6 7 8 9 10
Public cloud support
Private cloud support
Administrator convenience
Support for a large # of applications
Login for all SaaS and on-premise apps
Enforce company/regulatory policy
App access from multiple devices/locations
On a scale of 1-10, rate the importance of the following functionalities
for an IAM solution:
Strength/reputation of security technology
1 being “Not At All Important” and 10 being “Extremely Important”
The Growing Cloud Identity Crisis
13
When looking at the data by industry, a few interesting differences emerge:
Public and Private Cloud Support within IAM
You might expect that the ability to access public cloud applications like Salesforce or Google Apps
is driving IAM adoption. However, while both public and private cloud application access were
identified as important attributes for an IAM solution, private cloud access slightly outweighed
public cloud access in importance:
If you consider that a ranking of 8 or above on the scale of 1 to 10 as important, then 58% of
respondents counted support for private cloud access as important, compared with 43% of
respondents listing public cloud support as similarly important.
The Current IAM Market
> Strength/reputation of the security technology was slightly more important for 		
smaller companies, government agencies and manufacturing industries.
> Ability to access applications from multiple locations and devices was more highly 	
valued in retail and government institutions.
1 2 3 4 5 6 7 8 9 10
0%
5%
10%
15%
20%
25% Don’tknow/
NoAnswer
Support for public cloud
Support for private cloud
Importance of Public Cloud vs. Private Cloud on a scale of 1-10
1 being “Not At All Important” and 10 being “Extremely Important”
The Growing Cloud Identity Crisis
14
For businesses deploying a large number of cloud-based applications, the most pressing need in
managing access may be consolidating all the different credentials that people have to remember.
Cloud-based Single Sign-On replaces the numerous logins that people have to perform with one
login.
For many businesses, SSO the first step on the path to broader IAM solutions. SSO addresses the
issue of handling the multiple logins and significantly lowers the bar for deployment compared with
a comprehensive IAM solution. A growing number of cloud-based SSO solutions are working with
identity providers to give businesses a growth path into a broader IAM solution.
Single Sign-On Is in Demand
Overall, close to two thirds of the respondents (63 percent) either already have an SSO deployment
or plan to deploy SSO within six months. (Note that many larger businesses may have SSO for on-
premise applications, but not necessarily for cloud-based applications.)
There is little variation across company size, although significant variation among industries.
The industries with the highest current adoption of SSO solutions included computer hardware/
networking (65%), financial services (53%) and healthcare (53%).
Single Sign-On and Cloud-Based Apps
0% 10% 20% 30% 40% 50%
Don’t know
No plans
Plan to test/evaluate in 6 months
Plan to deploy within 6 months
Yes, have SSO
Does your company currently use, or plan to evaluate a
Single Sign-On (SSO) solution?
The Growing Cloud Identity Crisis
15
Single Sign-On and Cloud-Based Apps
SSO Solutions Are Working
Of those who have deployed SSO solutions, 93 percent were either “very satisfied” or “somewhat
satisfied” with their solutions.
How satisfied is your company with its Single Sign-On (SS0) solution?
Very Satisfied
Somewhat Satisfied
Unsatisfied
No Answer
50%
43%
5%
2%
The Growing Cloud Identity Crisis
16
Cloud Applications Appear to be Driving SSO Adoption
When analyzing which companies have deployed SSO solutions, one of the most important
predictors of adoption is how many hosted business applications the company uses. Businesses
that used more than 15 hosted applications were already using SSO at almost twice the rate of
businesses with fewer than 10 hosted applications:
It’s reasonable to extrapolate that as businesses add more hosted (cloud-based) applications to
their portfolio, the urgency for SSO increases. The continued growth of cloud-based business
applications is most likely fueling the additional growth and interest in cloud-based SSO.
Single Sign-On and Cloud-Based Apps
0
< 10
11-15
10
20
30
40
50
60
70
> 15
No plansPlan to test/
evaluate in 6
months
Plan to deploy
within 6 months
Yes, have SSO
Adoption of SSO by the number of hosted applications the company supports
Number of hosted
applications
The Growing Cloud Identity Crisis
17
Single Sign-On and Cloud-Based Apps
SSO Adoption Is Growing
There’s a lot of evaluation and deployment activity going on, with a full 35% of respondents in the
process of deploying, evaluating or testing an SSO solution.
When you look at the industries that are planning to evaluate and test SSO solutions within the next
six months, consumer retail, financial services and government sectors are considering SSO at a
higher rate than other industries.
Percentage of respondents that plan to test and evaluate SSO
within 6 months
0% 5% 10% 15% 20% 25% 30% 35%
Software and IT
Computer hardware/networking
Manufacturing
Healthcare
Government
Financial services
Education and training
Consumer retail
The Growing Cloud Identity Crisis
18
The data indicates a large amount of activity in the IAM and SSO market, specifically addressing
the challenges of managing secure access to cloud-based applications. Given the responses from
the survey, one can draw some conclusions about the factors that will influence the overall market
direction.
IAM Is a High Priority Purchase
When asked about how they rated IAM as a purchase priority, nearly a third of the respondents
listed IAM as a top tier priority, while another third considered it second tier.
Within industries, the technology industries (computer hardware and network, software and IT)
gave IAM the highest overall priority, followed by manufacturing:
Security and Trust are the Most Critical Features
When asked to rate the importance of product features as decision criteria in an IAM purchase,
security and trust in the vendor (including the vendor’s support) are the most important features
influencing solution evaluation:
The IAM Market Direction
0% 20% 40% 60% 80% 100%
Top Tier (e.g., in the top 3)
Second Tier
Third Tier
Software and IT
Manufacturing
Hardware/networking
All
Not a Priority
Don’t Know
No Answer
Technology industries give IAM the most important purchase priority
Purchase Priority
The Growing Cloud Identity Crisis
19
The IAM Market Direction
Price and Trust Drive Vendor Selection
Assuming that a cloud-based IAM solution addresses the key issues of security and trust, price
is the most important issue with vendor selection. The next most important features were vendor
support and reputation – again, factors ultimately related to trust.
1 2 3 4 5 6 7 8 9 10
Level of security
Support
Trust in vendor
Non-disruptive integration
Overall ease of use
Centralized management
Cost per user
Decision Criteria Importance
0% 10% 20% 30% 40% 50% 60% 70% 80%
Don’t Know
Free trial
Vendor size (big company vs. start up)
Vendor references and use cases
Vendor reputation
Vendor support of product
Price/licensing model
Factors in Selecting Cloud-Based IAM
The Growing Cloud Identity Crisis
20
IAM solutions already have a strong foothold in the financial services industry. A full 58% of the
financial services companies in the survey already had IAM, and another 36% were planning to
deploy or evaluate IAM within the next six months. Only one of the respondents in financial services
had no plans to evaluate or test IAM.
The financial services industry has long been subject to regulations, and is most sensitive to the
issues or challenges around compliance. When asked about the relevant challenges for cloud-
based application access, the financial services respondents called out the challenges related to
compliance – including enforcing password policies, managing (and revoking) application access,
and applying company policies.
When asked to choose a single challenge for managing access, 32% selected regulatory
compliance and audit as their main challenge, compared with 12% of the respondents overall.
Not surprisingly, financial services respondents also rated ‘Reporting’ as an important feature for
managing secure access to cloud-based applications. 53 percent ranked it as very important (9 or
10 on the scale of 10), compared with 36% of the overall respondents.
Industry Focus: Financial Services
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Preventing security breaches
Regulatory compliance and audit
Application of company policy
Password policy enforcement
Transparent access management
Revoking access to users
Assigning access to user
Financial Services Average
Most important IAM challenges for financial services compared to
overall respondents
The Growing Cloud Identity Crisis
21
Industry Focus: Manufacturing
Manufacturing companies accounted for more than 10 percent of the respondents. The difference
between their responses and other industries shed some light on what’s happening in the industry.
When it comes to important features for an IAM solution, manufacturing respondents highlighted
the importance of managing access to both public and private cloud applications at a higher rate
than respondents as a whole:
When asked about the challenges of managing secure access to cloud-based applications,
manufacturers gave nearly equal importance to enforcing password policies as preventing security
breaches.
0% 10% 20% 30% 40% 50% 60%
Private Cloud (9 or 10)
Public Cloud (9 or 10)
Manufacturing All respondents
The Growing Cloud Identity Crisis
22
The data paints the picture of an industry embracing cloud applications and struggling to handle
the ramifications. [For a discussion of the role of cloud computing in manufacturing, see the article
“Ten Ways Cloud Computing is Revolutionizing Manufacturing,” Louis Columbus, Forbes Online,
May 6 2013.]
Industry Focus: Manufacturing
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Admin workload reduction
Preventing security breaches
Control over SaaS apps
Application of company policy
Password policy enforcement
Manufacturing Average
Most important IAM challenges for manufacturing compared to
overall respondents
The Growing Cloud Identity Crisis
23
Summary
Although IAM as an industry is well established, it’s undergoing significant change with the broad
adoption of cloud computing. As companies deploy more business applications in the cloud, they
face new challenges securing access to those applications.
This is a time of significant market opportunity for organizations deploying IAM and SSO solutions.
The cloud-based delivery model makes IAM or SSO solutions simpler and more affordable to deploy
than traditional solutions in an on-premise environment. This report offers some guidance as to
the features that businesses deem most critical in an IAM deployment.
If you are planning an IAM or SSO deployment, consider the unique factors of your business and
industry as well as the broader trends outlined in this document. For example, do your cloud-
based applications manage regulated data? Do you have a high degree of workforce turnover? Is
your workforce highly mobile? These factors will affect the weight you give the various factors and
features of a solution.
Look for vendors who can meet those needs while earning and maintaining your trust. Factors to
consider include the strength of the technology used, the level of vendor support, and the overall
reputation of the vendor.
The Growing Cloud Identity Crisis
24
When asked about how they researched and found information on IAM solutions, recommendations
from IT partners and direct web searches topped the list.
When asked for their single most important source of information, however, some interesting
variations occurred depending on company size. Smaller businesses (less than 1000 employees)
relied most heavily on recommendations from IT partners. The mid-sized businesses (between
1000 and 5000 employees) relied on a range of different sources, including their own web research.
Appendix: Supporting the IAM Purchase
What is your company’s primary source of information on Identity and Access
Management solutions for cloud-based applications?
Recommendations from your IT partners
Analysts
Direct search on the Web
Peers and friends
Through communities
In events
31%
16%
10%
6%
1%
Don’t know
Other
No answer
19%
9%
6%
2%
The Growing Cloud Identity Crisis
25
Appendix: Supporting the IAM Purchase
In most organizations, the IT or IT/Security organization is responsible for managing the purchase
process for IAM solutions. However, business units sometimes manage the purchase process.
0 10 20 30 40
IT partners
Analysts
Press
Events
Peers
Communities
Web
Over 5000 1001-5000 101-1000
Don’t know
Primary source of information when evaluating Identity and
Access Management solutions
Company Size
0 10 20 30 40 50 60 70
Don’t know
Functional Groups
CFO or COO
IT/Security
Over 5000 1001-5000 101-1000
Who is responsible for managing the purchase process for
IAM solutions?
Company Size
The Growing Cloud Identity Crisis

More Related Content

What's hot

Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
drewz lin
 

What's hot (20)

Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access Management
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
 
Whitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsWhitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest Minds
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 

Viewers also liked

Medvilla.it 2015 - Presentazione [Ita]
Medvilla.it 2015 - Presentazione [Ita]Medvilla.it 2015 - Presentazione [Ita]
Medvilla.it 2015 - Presentazione [Ita]
William Hay
 
Seminar Series on Global Justice
Seminar Series on Global JusticeSeminar Series on Global Justice
Seminar Series on Global Justice
J S
 

Viewers also liked (14)

Old Media & New Media (Ugo Soleri)
Old Media & New Media (Ugo Soleri)Old Media & New Media (Ugo Soleri)
Old Media & New Media (Ugo Soleri)
 
Eco dibujo 3 4 0001
Eco dibujo 3 4 0001Eco dibujo 3 4 0001
Eco dibujo 3 4 0001
 
Arte.it mission statement2013(f)
Arte.it mission statement2013(f)Arte.it mission statement2013(f)
Arte.it mission statement2013(f)
 
Medvilla.it 2015 - Presentazione [Ita]
Medvilla.it 2015 - Presentazione [Ita]Medvilla.it 2015 - Presentazione [Ita]
Medvilla.it 2015 - Presentazione [Ita]
 
Eco dibujo 3 4 0001-2
Eco dibujo 3 4 0001-2Eco dibujo 3 4 0001-2
Eco dibujo 3 4 0001-2
 
Eco redacc 3 4 0001-2
Eco redacc 3 4 0001-2Eco redacc 3 4 0001-2
Eco redacc 3 4 0001-2
 
Seminar Series on Global Justice
Seminar Series on Global JusticeSeminar Series on Global Justice
Seminar Series on Global Justice
 
Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...
 
Ibm Report Arte
Ibm Report ArteIbm Report Arte
Ibm Report Arte
 
DICOMweb (STOW, WADO, QIDO): Potential and implemntation sample
DICOMweb (STOW, WADO, QIDO): Potential and implemntation sampleDICOMweb (STOW, WADO, QIDO): Potential and implemntation sample
DICOMweb (STOW, WADO, QIDO): Potential and implemntation sample
 
Vendere sulle vetrine virtuali come eBay ed Amazon
Vendere sulle vetrine virtuali come eBay ed AmazonVendere sulle vetrine virtuali come eBay ed Amazon
Vendere sulle vetrine virtuali come eBay ed Amazon
 
HEADS, an automatic system for the early detection of oil leaks
HEADS, an automatic system for the early detection of oil leaksHEADS, an automatic system for the early detection of oil leaks
HEADS, an automatic system for the early detection of oil leaks
 
Craniostenosis
Craniostenosis Craniostenosis
Craniostenosis
 
Decumanus, innovative solution to improve the quality of life and mitigate th...
Decumanus, innovative solution to improve the quality of life and mitigate th...Decumanus, innovative solution to improve the quality of life and mitigate th...
Decumanus, innovative solution to improve the quality of life and mitigate th...
 

Similar to Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Identity & Access Management and Single Sign-On

New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
Symplified
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracode
Sean Varga
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSec
Jessica Lavery Pozerski
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker Dealers
Broadridge
 

Similar to Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Identity & Access Management and Single Sign-On (20)

Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market Report
 
Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracode
 
Cscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-surveyCscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-survey
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSec
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker Dealers
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility Survey
 
The advantages of Cloud Application Control
The advantages of Cloud Application ControlThe advantages of Cloud Application Control
The advantages of Cloud Application Control
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
Actionable insights
Actionable insightsActionable insights
Actionable insights
 
Advancing Identity and Access Management to the Next Level with Contextual Aw...
Advancing Identity and Access Management to the Next Level with Contextual Aw...Advancing Identity and Access Management to the Next Level with Contextual Aw...
Advancing Identity and Access Management to the Next Level with Contextual Aw...
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Ransomware Mallox [EN].pdf
Ransomware         Mallox       [EN].pdfRansomware         Mallox       [EN].pdf
Ransomware Mallox [EN].pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Identity & Access Management and Single Sign-On

  • 1. The Growing Cloud Identity Crisis: A Detailed Survey Report on Cloud-Based Solutions for IAM and SSO
  • 2. Executive Summary Background Terms and Definitions About the Research Managing Access to Cloud Applications Top Challenges of Cloud Application Access The Most Important Features for Cloud Application Access The Current IAM Market IAM Is Gaining Widespread Adoption Existing IAM Deployments The Most Valued IAM Functionality Public and Private Cloud Support within IAM Single Sign-On and Cloud-Based Applications Single Sign-On Is in Demand SSO Solutions Are Working Cloud Applications Appear to be Driving SSO Adoption SSO Adoption Is Growing The IAM Market Direction IAM Is a High Priority Purchase Security and Trust Are the Most Critical Features Price and Trust Drive Vendor Selection Industry Focus: Financial Services and Compliance Concerns Industry Focus: Manufacturing Moves to the Cloud Summary Appendix: Supporting the IAM Purchase Process 2 Table of Contents 3 4 6 11 14 18 20 21 23 24 The Growing Cloud Identity Crisis
  • 3. This report highlights the results of research conducted by Gemalto, makers of CloudEntr, in conjunction with 451 Research in October 2013. The survey captured results from IT decision- makers in North American companies with a specific focus on the Identity and Access Management (IAM) market and its growing role in securing access to cloud-based applications. The data reveals an IAM market in transition, in large part due to the increase in cloud-based applications. As companies increase their reliance on cloud-based applications, they face growing challenges in managing access to those applications. Although the IAM market is well established, with almost half of respondents already having an IAM solution in place, it’s still in flux as well. Single Sign-On (SSO) solutions are gaining traction at the same time. The more hosted applications a business uses, the more likely they are to have deployed an SSO solution. The continued growth of cloud-based business applications is most likely fueling the additional growth and interest in cloud-based SSO. Finally, security and trust in the vendor are the most important factors in choosing IAM solutions and vendors. Businesses are looking for a strong reputation and solid support policies, as well as pricing that meets their needs. 3 > Security is the top concern when it comes to managing access to cloud-based applications. The #1 challenge named by survey respondents was “preventing security breaches.” > Many businesses are looking for strong authentication solutions as a way to reduce the risks of cloud-based application access. Managing mobile access is also critical for all but the largest of the companies. > Almost 30 percent of respondents were in the process of evaluating or deploying new IAM solutions. > When it comes to IAM solutions, businesses are looking for security and the ability to handle access from multiple devices and locations. Businesses in regulated industries (healthcare, financial services) are particularly interested in enforcing company policies. Executive Summary The Growing Cloud Identity Crisis
  • 4. 4 Cloud computing presents new challenges for the enterprise. IT organizations are suddenly responsible for managing access to cloud-based applications that reside outside the enterprise firewalls. They have the same levels of responsibility for securing access to cloud-based applications as on-premise apps, but without the same level of control. Many organizations already have processes and technologies for managing authentication and access to their on-premise applications. A mature Identity and Access Management (IAM) marketplace addresses these needs quite well. But with the advent of cloud computing, the market is being stretched to address the needs of securing access to cloud-based applications. The growing need comes from both ends of the market: The survey was designed to deliver a better understanding of what’s happening in this market, which is characterized both by mature on-premise solutions and a growing number of new cloud- based participants. Terms and Definitions Identity and Access Management (IAM) solutions facilitate the management and automation of user access to systems or applications within an organization. They typically manage user authentication (ascertaining user identity), authorization (what privileges they have), and application access. Single Sign-On (SSO) solutions address the authentication part of the IAM puzzle. They simplify access to multiple diverse applications by consolidating application access from a single login. Once authenticated with the SSO solution, the user does not have to enter an account and password to access the downstream applications – the SSO solution manages authentication. SSO may be a feature of a comprehensive IAM solution. Stand-alone SSO solutions may integrate with IAM solutions to exchange information about user identity and authorization levels. > Companies with established IAM solutions need to extend those practices and capabilities to handle the growing number of cloud-based applications their business users access. > Small or growing companies often have no in-house IAM solutions and rely heavily on cloud-based applications. These represent new potential participants in the IAM market. Background The Growing Cloud Identity Crisis
  • 5. 5 About the Research In October 2013, Gemalto, in conjunction with 451 Research, conducted a survey of North American IT decision-makers and influencers about their use of Identity and Access Management solutions and single sign-on (SSO) solutions. More than two hundred respondents, across all industry sectors, responded to the survey. Titles included IT directors and managers, security executives (CSOs, compliance managers), and line of business executives with security mandates. For many of the questions, respondents were asked to rate the importance of different factors or features on a scale of 1 to 10, with 10 being “very important.” In some of the results, we report the consensus estimate of importance, which in this case is the answer averaged over all respondents in the categories. In some cases, the sample sizes are too small to report statistically significant findings – particularly when drilling down by industry. And almost 30% of the respondents fell outside of the defined categories, answering “Other” for their industry. However, we have called out several instances in which meaningful industry differences appear in the data. Background The Growing Cloud Identity Crisis
  • 6. Number of hosted applications reportedly used, by business size 0 10 20 30 40 50 5 6 to 10 11 to 15 16 to 20 20> > Over 5,000 1001-5000 101-1000 Company Size 6 One of the biggest changes to the enterprise IT environment in recent years has been the growth of cloud-based applications. Even those organizations with established IAM solutions for on-premise applications must now figure out how to manage employee and contractor access to cloud-based or hosted applications. To avoid the complications of cloud, the survey simply asked respondents about how many “hosted applications” the business used. Although you might expect cloud adoption to be more pervasive in the smaller businesses, the research showed that many of the larger businesses (with more than 5000 employees) use more than 20 hosted applications. Top Challenges of Cloud Application Access The survey asked respondents about which challenges were relevant to their company when it came to managing secure access to cloud-based applications. Respondents could select all of the cloud access security challenges that applied. The clear leader in challenges was the issue of preventing security breaches. Managing Access to Cloud Applications The Growing Cloud Identity Crisis
  • 7. 7 It comes as no surprise in today’s environment that preventing security breaches would be top of mind. But recall that this survey was taken in October of 2013 – before the Target data breach, the Marriot and Niemen Marcus breaches, and the Senate hearings and subsequent press coverage. When asked to identify the single biggest challenge when it comes to secure access to cloud-based applications, the overwhelming concern is preventing security breaches. Regulatory compliance, which was eighth on the list above, is second on the list when companies can choose only one challenge. This highlights industry differences – for many businesses in regulated industries, regulatory compliance is the most important issue. Managing Access to Cloud Applications Challenges of Managing Secure Access to Cloud Apps 0% 10% 20% 30% 40% 50% 60% 70% Administrative workload reduction Managing (BYOD) Improving end user experience Regulatory compliance and audit Control over SaaS applications Application of company policy Transparent access management Revoking access of users Password policy enforcement Assigning access to users Preventing security breaches The Growing Cloud Identity Crisis
  • 8. 8 Respondents from organizations with more than 1,000 employees tended to give more weight to administrative workload reduction and controlling SaaS applications. Businesses with more than 5,000 employees were more concerned with “application of company policy” as a challenge for cloud-based applications. Managing Access to Cloud Applications Which one of the following is the biggest challenge in your company in terms of managing secure access to cloud-based applications? 30% 25% 20% 15% 10% 5% 0% Preventing security breaches Regulatory compliance & audit Assigning access to users (employees and contractors) Transparent access management (who has access to what) The Growing Cloud Identity Crisis
  • 9. 1 2 3 4 5 6 7 8 9 10 Reporting and analytics Mobile access Single Sign-On Authentication methods Authentication policy management Ease of provisioning Password manager Strong authentication How would you rate the importance of each of the following for managing secure access to cloud-based applications? (consensus estimate): 9 The Most Important Features for Cloud Application Access The survey participants identified a wide range of features that they felt were critical to addressing the challenges above. The most highly ranked feature was strong authentication. Managing Access to Cloud Applications 0% 10% 20% 30% 40% 50% 60% 70% Admin workload reduction Over 5000 1001-5000 101-1000 Involving end user experience Managing (BYOD) Preventing security breaches Control over SaaS apps Regulatory compliance and audit Application of company policy Password policy enforcement Transparent access mgmt. Revoking access Assigning access Don’t know Company Size The Growing Cloud Identity Crisis
  • 10. 10 While strong authentication is the clear leader, it’s worth noting that the rest of the responses are fairly tightly clustered – nearly everything is important. Reporting and Analytics rank lowest for the group of respondents as a whole; only 36% of the respondents said it was very important (a 9 or 10 on the scale of 1 to 10). But in the financial services industry, 53% of the respondents said that Reporting and Analytics were very important. Company size also affected the relative importance of the different features. For example, mobile access was less important for companies larger than 5,000. It’s unclear why this should be true – perhaps those larger companies imagine that BYOD policies about using mobile devices were enough, or perhaps the workforce patterns are different among these very large companies. The lower ratings from the companies greater than 5,000 may have brought down the overall weighted importance of mobile access across the respondents as a whole. Managing Access to Cloud Applications 1 2 3 4 5 6 7 8 9 10 0% Importance of Mobile Access features for managing secure access to cloud-based applications, by company size: Over 5000 1001-5000 101-1000 5% 10% 15% 20% 25% 30% Company Size The Growing Cloud Identity Crisis
  • 11. 11 The business IT landscape is changing, with the corporate perimeter disappearing. This has significant implications for Identity and Access Management practices. At the enterprise level, many businesses are adopting cloud-based applications, while small and mid-sized businesses are embracing cloud-based applications to delegate IT overhead and responsibilities. As the research highlights, the more of these cloud-based applications businesses use, the greater their need for IAM and SSO capabilities that reach beyond the on-premise perimeter to manage user identity and application access in the cloud. The survey data reveals an IAM market that is both mature and in transition at the same time. Although many companies already have IAM solutions, a large number are also in the process of testing, evaluating or deploying IAM solutions. IAM Is Gaining Widespread Adoption When asked whether or not they had an IAM solution already, the data reveals a mix of existing implementations (maturity) and new deployments and evaluations (change and disruption). The Current IAM Market > Nearly half of the respondents already had an IAM solution. > Another 30% planned to either deploy or evaluate/test IAM in the next six months Does your company currently use any Identity and Access Management solutions? Yes, have IAM Will deploy in 6 months Plan to test/evaluate within 6 months No plans Don’t know No Answer 48% 16% 14% 14% 6% 1% The Growing Cloud Identity Crisis
  • 12. 12 While a 50% deployment would indicate a fairly mature industry, the large number of evaluations means that conditions are changing in such a way as to spur significant adoption. The increasing uptake in cloud-based applications is no doubt part of that change. Existing IAM Deployments Adoption of IAM was fairly consistent across the range of company sizes. But adoption varied by industry, with the greatest deployments in technology (hardware and software) industries, as well as financial services. When asked to name their existing IAM solutions, respondents tended to list on-premise IAM solutions from Microsoft (including Active Directory), IBM, CA, Oracle, and others. The cloud-based IAM solutions were mostly missing from the existing deployments. Cloud-based IAM solutions may be driving newer deployments planned in the coming months. The Most Valued IAM Functionality When asked about the most important attributes of an IAM solution, security and convenience were the main themes. The Current IAM Market 1 2 3 4 5 6 7 8 9 10 Public cloud support Private cloud support Administrator convenience Support for a large # of applications Login for all SaaS and on-premise apps Enforce company/regulatory policy App access from multiple devices/locations On a scale of 1-10, rate the importance of the following functionalities for an IAM solution: Strength/reputation of security technology 1 being “Not At All Important” and 10 being “Extremely Important” The Growing Cloud Identity Crisis
  • 13. 13 When looking at the data by industry, a few interesting differences emerge: Public and Private Cloud Support within IAM You might expect that the ability to access public cloud applications like Salesforce or Google Apps is driving IAM adoption. However, while both public and private cloud application access were identified as important attributes for an IAM solution, private cloud access slightly outweighed public cloud access in importance: If you consider that a ranking of 8 or above on the scale of 1 to 10 as important, then 58% of respondents counted support for private cloud access as important, compared with 43% of respondents listing public cloud support as similarly important. The Current IAM Market > Strength/reputation of the security technology was slightly more important for smaller companies, government agencies and manufacturing industries. > Ability to access applications from multiple locations and devices was more highly valued in retail and government institutions. 1 2 3 4 5 6 7 8 9 10 0% 5% 10% 15% 20% 25% Don’tknow/ NoAnswer Support for public cloud Support for private cloud Importance of Public Cloud vs. Private Cloud on a scale of 1-10 1 being “Not At All Important” and 10 being “Extremely Important” The Growing Cloud Identity Crisis
  • 14. 14 For businesses deploying a large number of cloud-based applications, the most pressing need in managing access may be consolidating all the different credentials that people have to remember. Cloud-based Single Sign-On replaces the numerous logins that people have to perform with one login. For many businesses, SSO the first step on the path to broader IAM solutions. SSO addresses the issue of handling the multiple logins and significantly lowers the bar for deployment compared with a comprehensive IAM solution. A growing number of cloud-based SSO solutions are working with identity providers to give businesses a growth path into a broader IAM solution. Single Sign-On Is in Demand Overall, close to two thirds of the respondents (63 percent) either already have an SSO deployment or plan to deploy SSO within six months. (Note that many larger businesses may have SSO for on- premise applications, but not necessarily for cloud-based applications.) There is little variation across company size, although significant variation among industries. The industries with the highest current adoption of SSO solutions included computer hardware/ networking (65%), financial services (53%) and healthcare (53%). Single Sign-On and Cloud-Based Apps 0% 10% 20% 30% 40% 50% Don’t know No plans Plan to test/evaluate in 6 months Plan to deploy within 6 months Yes, have SSO Does your company currently use, or plan to evaluate a Single Sign-On (SSO) solution? The Growing Cloud Identity Crisis
  • 15. 15 Single Sign-On and Cloud-Based Apps SSO Solutions Are Working Of those who have deployed SSO solutions, 93 percent were either “very satisfied” or “somewhat satisfied” with their solutions. How satisfied is your company with its Single Sign-On (SS0) solution? Very Satisfied Somewhat Satisfied Unsatisfied No Answer 50% 43% 5% 2% The Growing Cloud Identity Crisis
  • 16. 16 Cloud Applications Appear to be Driving SSO Adoption When analyzing which companies have deployed SSO solutions, one of the most important predictors of adoption is how many hosted business applications the company uses. Businesses that used more than 15 hosted applications were already using SSO at almost twice the rate of businesses with fewer than 10 hosted applications: It’s reasonable to extrapolate that as businesses add more hosted (cloud-based) applications to their portfolio, the urgency for SSO increases. The continued growth of cloud-based business applications is most likely fueling the additional growth and interest in cloud-based SSO. Single Sign-On and Cloud-Based Apps 0 < 10 11-15 10 20 30 40 50 60 70 > 15 No plansPlan to test/ evaluate in 6 months Plan to deploy within 6 months Yes, have SSO Adoption of SSO by the number of hosted applications the company supports Number of hosted applications The Growing Cloud Identity Crisis
  • 17. 17 Single Sign-On and Cloud-Based Apps SSO Adoption Is Growing There’s a lot of evaluation and deployment activity going on, with a full 35% of respondents in the process of deploying, evaluating or testing an SSO solution. When you look at the industries that are planning to evaluate and test SSO solutions within the next six months, consumer retail, financial services and government sectors are considering SSO at a higher rate than other industries. Percentage of respondents that plan to test and evaluate SSO within 6 months 0% 5% 10% 15% 20% 25% 30% 35% Software and IT Computer hardware/networking Manufacturing Healthcare Government Financial services Education and training Consumer retail The Growing Cloud Identity Crisis
  • 18. 18 The data indicates a large amount of activity in the IAM and SSO market, specifically addressing the challenges of managing secure access to cloud-based applications. Given the responses from the survey, one can draw some conclusions about the factors that will influence the overall market direction. IAM Is a High Priority Purchase When asked about how they rated IAM as a purchase priority, nearly a third of the respondents listed IAM as a top tier priority, while another third considered it second tier. Within industries, the technology industries (computer hardware and network, software and IT) gave IAM the highest overall priority, followed by manufacturing: Security and Trust are the Most Critical Features When asked to rate the importance of product features as decision criteria in an IAM purchase, security and trust in the vendor (including the vendor’s support) are the most important features influencing solution evaluation: The IAM Market Direction 0% 20% 40% 60% 80% 100% Top Tier (e.g., in the top 3) Second Tier Third Tier Software and IT Manufacturing Hardware/networking All Not a Priority Don’t Know No Answer Technology industries give IAM the most important purchase priority Purchase Priority The Growing Cloud Identity Crisis
  • 19. 19 The IAM Market Direction Price and Trust Drive Vendor Selection Assuming that a cloud-based IAM solution addresses the key issues of security and trust, price is the most important issue with vendor selection. The next most important features were vendor support and reputation – again, factors ultimately related to trust. 1 2 3 4 5 6 7 8 9 10 Level of security Support Trust in vendor Non-disruptive integration Overall ease of use Centralized management Cost per user Decision Criteria Importance 0% 10% 20% 30% 40% 50% 60% 70% 80% Don’t Know Free trial Vendor size (big company vs. start up) Vendor references and use cases Vendor reputation Vendor support of product Price/licensing model Factors in Selecting Cloud-Based IAM The Growing Cloud Identity Crisis
  • 20. 20 IAM solutions already have a strong foothold in the financial services industry. A full 58% of the financial services companies in the survey already had IAM, and another 36% were planning to deploy or evaluate IAM within the next six months. Only one of the respondents in financial services had no plans to evaluate or test IAM. The financial services industry has long been subject to regulations, and is most sensitive to the issues or challenges around compliance. When asked about the relevant challenges for cloud- based application access, the financial services respondents called out the challenges related to compliance – including enforcing password policies, managing (and revoking) application access, and applying company policies. When asked to choose a single challenge for managing access, 32% selected regulatory compliance and audit as their main challenge, compared with 12% of the respondents overall. Not surprisingly, financial services respondents also rated ‘Reporting’ as an important feature for managing secure access to cloud-based applications. 53 percent ranked it as very important (9 or 10 on the scale of 10), compared with 36% of the overall respondents. Industry Focus: Financial Services 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Preventing security breaches Regulatory compliance and audit Application of company policy Password policy enforcement Transparent access management Revoking access to users Assigning access to user Financial Services Average Most important IAM challenges for financial services compared to overall respondents The Growing Cloud Identity Crisis
  • 21. 21 Industry Focus: Manufacturing Manufacturing companies accounted for more than 10 percent of the respondents. The difference between their responses and other industries shed some light on what’s happening in the industry. When it comes to important features for an IAM solution, manufacturing respondents highlighted the importance of managing access to both public and private cloud applications at a higher rate than respondents as a whole: When asked about the challenges of managing secure access to cloud-based applications, manufacturers gave nearly equal importance to enforcing password policies as preventing security breaches. 0% 10% 20% 30% 40% 50% 60% Private Cloud (9 or 10) Public Cloud (9 or 10) Manufacturing All respondents The Growing Cloud Identity Crisis
  • 22. 22 The data paints the picture of an industry embracing cloud applications and struggling to handle the ramifications. [For a discussion of the role of cloud computing in manufacturing, see the article “Ten Ways Cloud Computing is Revolutionizing Manufacturing,” Louis Columbus, Forbes Online, May 6 2013.] Industry Focus: Manufacturing 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Admin workload reduction Preventing security breaches Control over SaaS apps Application of company policy Password policy enforcement Manufacturing Average Most important IAM challenges for manufacturing compared to overall respondents The Growing Cloud Identity Crisis
  • 23. 23 Summary Although IAM as an industry is well established, it’s undergoing significant change with the broad adoption of cloud computing. As companies deploy more business applications in the cloud, they face new challenges securing access to those applications. This is a time of significant market opportunity for organizations deploying IAM and SSO solutions. The cloud-based delivery model makes IAM or SSO solutions simpler and more affordable to deploy than traditional solutions in an on-premise environment. This report offers some guidance as to the features that businesses deem most critical in an IAM deployment. If you are planning an IAM or SSO deployment, consider the unique factors of your business and industry as well as the broader trends outlined in this document. For example, do your cloud- based applications manage regulated data? Do you have a high degree of workforce turnover? Is your workforce highly mobile? These factors will affect the weight you give the various factors and features of a solution. Look for vendors who can meet those needs while earning and maintaining your trust. Factors to consider include the strength of the technology used, the level of vendor support, and the overall reputation of the vendor. The Growing Cloud Identity Crisis
  • 24. 24 When asked about how they researched and found information on IAM solutions, recommendations from IT partners and direct web searches topped the list. When asked for their single most important source of information, however, some interesting variations occurred depending on company size. Smaller businesses (less than 1000 employees) relied most heavily on recommendations from IT partners. The mid-sized businesses (between 1000 and 5000 employees) relied on a range of different sources, including their own web research. Appendix: Supporting the IAM Purchase What is your company’s primary source of information on Identity and Access Management solutions for cloud-based applications? Recommendations from your IT partners Analysts Direct search on the Web Peers and friends Through communities In events 31% 16% 10% 6% 1% Don’t know Other No answer 19% 9% 6% 2% The Growing Cloud Identity Crisis
  • 25. 25 Appendix: Supporting the IAM Purchase In most organizations, the IT or IT/Security organization is responsible for managing the purchase process for IAM solutions. However, business units sometimes manage the purchase process. 0 10 20 30 40 IT partners Analysts Press Events Peers Communities Web Over 5000 1001-5000 101-1000 Don’t know Primary source of information when evaluating Identity and Access Management solutions Company Size 0 10 20 30 40 50 60 70 Don’t know Functional Groups CFO or COO IT/Security Over 5000 1001-5000 101-1000 Who is responsible for managing the purchase process for IAM solutions? Company Size The Growing Cloud Identity Crisis