With a decade of evidence on the risks and a plethora of identity security solutions, identity is shifting from the domain of IT operations into cybersecurity.

Omdia view

Summary

Despite the transformation to a dynamic, amorphous perimeter, a multitude of identity security solutions and managed identity services exist.

Opening Doors for the Right Entities and Locking Out the Bad Actors.

Organizations continue to rely on identities that are susceptible to compromise, abuse, misuse, and theft. Risk is compounded by over-permissive, static access rights that provide little to no visibility into access trends or, most importantly, who is accessing what and how they are doing so.

Despite the transformation to a dynamic, amorphous perimeter, a multitude of identity security solutions and managed identity services exist. Unfortunately, organizations have been slow to pivot their security programs to an approach that incorporates identities as a foundational aspect of their cybersecurity strategy.

However, CISOs and security professionals are beginning to understand the importance of securing identities. With a decade of evidence on the risks and a plethora of identity security solutions, identity is shifting from the domain of IT operations into cybersecurity.

To gain further insight into these trends, we surveyed 372 IT, cybersecurity, and application development professionals at organizations in North America (US and Canada) responsible for or involved with identity security technologies and processes.

Read the Research Report. The State of Identity Security: Opening Doors for the Right Entities and Locking Out the Bad Actors

Appendix

Further reading

Explore the survey results

Watch a video summary

Read the research brief

Author

Todd Thiemann, Principal Analyst, Identity Security & Data Security

[email protected]