
Blind Spots And Security Risks In Current Identity Strategies
Two-thirds of companies don't know what users are doing after log-in. SECURITY + OPERATIONAL FL AWS IN CURRENT IDENTITY & ACCESS MANAGEMENT (IAM) STRATEGIES 64% 38% 24% CANNOT AUDIT EXPERIENCED UNAUTHORIZED ACCESS USER ACTIVITY HACK EXPOSED BEYOND LOGIN USER CREDS WHO BUSINESSES ARE AUTHORIZING TO USE THEIR CORPORATE APPLICATIONS 50% 54% 55% 45% 250+ 250+ 1500+ 4000+ PARTNERS CONTRACTORS/ CONSULTANTS EMPLOYEES CUSTOMERS HAVE A POLICY ALLOWING 76% EMPLOYEES TO ACCESS CORPORATE APPLICATIONS VIA MOBILE DEVICES 68% HAVE A MOBILE ACCESS POLICY FOR PARTNERS 68° SNAPSHOT OF IAM IN 3 INDUSTRIES 77% CANNOT A UDIT USER ACTIVITY BEYOND LOGIN WHETHER ACCESS IS VIA A COMPUTER, MOBILE DEVICE, OR BOTH. 64% EDUCATION 58% HEALTHCARE FINANCIAL SERVICES ACCIDENTAL ACCESS BY AN UNAUTHORIZED USER 47% 36% 32% FINANCIAL SERVICES HEALTHCARE EDUCATION 89% HAVE TW0 OR MORE REPOSITORIES FOR USER IDENTITIES 85% HEALTHCARE EDUCATION 83% FINANCIAL SERVICES Learn more at www.symplified.com. symplified. Research methodology: The survey was conducted between April 25 and May 2, 2013 among 225 IT professionals at US-based companies ranging in size who completed a web-based survey commissioned by Symplified from Qualtrics, Inc. At the 95% confidence level the margin of error is +/6.53 percentage points.
Blind Spots And Security Risks In Current Identity Strategies
Source
http://www.s...trategies/Category
BusinessGet a Quote