Click me
Transcribed

Blind Spots And Security Risks In Current Identity Strategies

Two-thirds of companies don't know what users are doing after log-in. SECURITY + OPERATIONAL FL AWS IN CURRENT IDENTITY & ACCESS MANAGEMENT (IAM) STRATEGIES 64% 38% 24% CANNOT AUDIT EXPERIENCED UNAUTHORIZED ACCESS USER ACTIVITY HACK EXPOSED BEYOND LOGIN USER CREDS WHO BUSINESSES ARE AUTHORIZING TO USE THEIR CORPORATE APPLICATIONS 50% 54% 55% 45% 250+ 250+ 1500+ 4000+ PARTNERS CONTRACTORS/ CONSULTANTS EMPLOYEES CUSTOMERS HAVE A POLICY ALLOWING 76% EMPLOYEES TO ACCESS CORPORATE APPLICATIONS VIA MOBILE DEVICES 68% HAVE A MOBILE ACCESS POLICY FOR PARTNERS 68° SNAPSHOT OF IAM IN 3 INDUSTRIES 77% CANNOT A UDIT USER ACTIVITY BEYOND LOGIN WHETHER ACCESS IS VIA A COMPUTER, MOBILE DEVICE, OR BOTH. 64% EDUCATION 58% HEALTHCARE FINANCIAL SERVICES ACCIDENTAL ACCESS BY AN UNAUTHORIZED USER 47% 36% 32% FINANCIAL SERVICES HEALTHCARE EDUCATION 89% HAVE TW0 OR MORE REPOSITORIES FOR USER IDENTITIES 85% HEALTHCARE EDUCATION 83% FINANCIAL SERVICES Learn more at www.symplified.com. symplified. Research methodology: The survey was conducted between April 25 and May 2, 2013 among 225 IT professionals at US-based companies ranging in size who completed a web-based survey commissioned by Symplified from Qualtrics, Inc. At the 95% confidence level the margin of error is +/6.53 percentage points.

Blind Spots And Security Risks In Current Identity Strategies

shared by studiopattern on Jun 12
234 views
2 share
0 comments
A new survey from Symplified of IT executives and administrators shows many organizations with IAM solutions in place have no visibility into what people are doing while logged into those applications...

Category

Business
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size