Sie sind auf Seite 1von 9

Forrester Opportunity Snapshot: A Custom Study Commissioned By SailPoint | December 2018

Where To Begin With Identity Governance


Successfully Manage Digital Identities Across The Enterprise To
Reduce Risk, Increase Productivity, And Improve Security

GET STARTED

FORRESTER.COM
Forrester Opportunity Snapshot: A Custom Study Commissioned By SailPoint | December 2018

Where To Begin With Identity Governance

OVERVIEW SITUATION APPROACH OPPORTUNITY CONCLUSIONS

Identity Management Is Critically Important But Not Widely Used


Identity management and governance solutions give security and IT professionals the ability to provision all users with the
appropriate level of access to critical applications, systems, and data, thereby minimizing the risk of data breaches and compliance
violations, improving end-user productivity, and creating IT efficiencies. Firms that adopt the right solutions to successfully manage
digital identities across their enterprise are better equipped to grow safely and innovate securely. Unfortunately, many enterprises
simply don’t know where to begin.
In December 2018, SailPoint commissioned Forrester Consulting to evaluate if and how firms are utilizing identity management as
part of their security and compliance approach.

Company size Position Region Position/department


› 2,501 to 5,000 › C-level: 9% › US: 54% › Security and risk: 67%
employees: 50% › VP: 18% › UK: 21% › IT: 33%
› 5,001 to 10,000 › Director: 30% › Australia (AU): 25%
employees: 50% › Manager: 43%

FORRESTER.COM
Forrester Opportunity Snapshot: A Custom Study Commissioned By SailPoint | December 2018

Where To Begin With Identity Governance

OVERVIEW SITUATION APPROACH OPPORTUNITY CONCLUSIONS

1 2

Effective Identity Management, Although Top Of Mind, Is Just Out Of Arm’s Reach
Most firms understand the concept of identity management — the policies, processes, and technologies that digital businesses employ to
establish identities and control access to their resources across the dynamic ecosystems of value. And many acknowledge its importance to
an organization’s overall success. Yet, even with this consensus, firms struggle to implement a robust identity management strategy. This is
due to a general lack of knowledge of the necessary steps required to effectively execute. Forty-five percent of firms we studied claim they
simply, “do not know where to start,” when it comes to carrying out identity management strategies. This dissonance between intention and
ability must be addressed if companies want to optimize their identity management and address security and compliance problems.

89% of firms
are not only
familiar with
the concept of
identity
management,
but believe
that it’s
applicable to
their
organization’s
overall
security.

FORRESTER.COM
Forrester Opportunity Snapshot: A Custom Study Commissioned By SailPoint | December 2018

Where To Begin With Identity Governance

OVERVIEW SITUATION APPROACH OPPORTUNITY CONCLUSIONS

1 2

The Tasks Associated With Identity


Management Also Prove Difficult
For Firms
It’s not just that security and IT teams don’t know how to get started
with identity management, it’s that the tactical responsibilities of
identity management prove problematic in and of themselves. While
some tasks — like detecting and remediating orphan and rogue
accounts — were a challenge for about one-third of teams, more
granular controls like managing user account entitlements within
apps and data and integrating identity governance processes during
new application rollout were an issue for a full two-thirds of firms.
Organizations need a road map toward effective identity
management, as well as the skills, knowledge, and tools to help
them effectively carry out the steps in these road maps to succeed.

Of the 13 identity management tasks presented to respondents,


more than half of all firms found five of these tasks challenging.

FORRESTER.COM
Forrester Opportunity Snapshot: A Custom Study Commissioned By SailPoint | December 2018

Where To Begin With Identity Governance

OVERVIEW SITUATION APPROACH OPPORTUNITY CONCLUSIONS

1 2

Widespread Security Threats Put Firms’


Data At Serious Risk
Firms are already experiencing security and compliance threats in
the form of data breaches, alteration of data, and even wire-transfer
fraud. Of the organizations we surveyed, nearly half experienced a
breach that resulted in the loss of customer or employee data in the
last year.
What’s worse is that firms report feeling more vulnerable to the data
breaches they’ve previously experienced, than they are confident in
their ability to detect them moving forward. Without an effective
identity management program in place, companies will remain at risk
to security threats and compliance infringements.

Nearly half of all firms have


experienced data breaches in
the previous year, but more
than half of these same firms
still feel vulnerable to threats.

FORRESTER.COM
Forrester Opportunity Snapshot: A Custom Study Commissioned By SailPoint | December 2018

Where To Begin With Identity Governance

OVERVIEW SITUATION APPROACH OPPORTUNITY CONCLUSIONS

1 2

Poor Identity Management Compounds


Security And Compliance Risk
While the firms we surveyed clearly have work to do to address their
growing security and compliance challenges, the reality is that a
comprehensive identity management strategy can address many of
the following problems:
• Compliance with new privacy laws.
• The risk involved with bring-your-own-device (BYOD) policies.
• Understanding user access across the organization.
The reality is that other competing top challenges — like IT
complexity and the evolving nature of threats — make it even harder
for firms who are already struggling with the concept of identity
management to know how to begin.

Firms’ top security challenges speak to their struggles with


identity management.

FORRESTER.COM
Forrester Opportunity Snapshot: A Custom Study Commissioned By SailPoint | December 2018

Where To Begin With Identity Governance

OVERVIEW SITUATION APPROACH OPPORTUNITY CONCLUSIONS

1 2

Firms Haven’t Yet Found The Right


Technology Mix To Enable Effective
Identity Management
The implementation of identity management technology has been
piecemeal or non-existent for the firms in our survey. Technologies
like employee fraud management enjoy widespread use, while other
critical solutions like automated provisioning are far less common.
The reason for this haphazard technology rollout is due to the fact
that firms just don’t know where to begin. Instead of instituting an
identity management strategy, and methodically choosing the
appropriate solutions to enact that strategy, organizations have been
in reactive mode, implementing siloed tools in an attempt to put out
whatever fire is currently top of mind. Firms must shift toward
thinking holistically and long term about what solution is actually
needed, not just which one can solve the current problem.

FORRESTER.COM
Forrester Opportunity Snapshot: A Custom Study Commissioned By SailPoint | December 2018

Where To Begin With Identity Governance

OVERVIEW SITUATION APPROACH OPPORTUNITY CONCLUSIONS

1 2

The Right Solution Can Enable Holistic Identity Management And Business Benefits
Despite the current and scattered implementation of solutions, firms agree that there are certain criteria that are most useful in identity
management technology. Firms need a solution that has the ability to govern complex, hybrid IT environments that span both on-premises and
cloud apps and data. They also want password management capabilities and the ability to deliver flexible user interfaces for both business and
IT users. With the right, comprehensive identity management solution in place, firms will be better able to build a holistic strategy for security
and compliance, all while delivering productivity and economic efficiencies, improving security, and increasing regulatory compliance.

FORRESTER.COM
Forrester Opportunity Snapshot: A Custom Study Commissioned By SailPoint | December 2018

Where To Begin With Identity Governance

OVERVIEW SITUATION APPROACH OPPORTUNITY CONCLUSIONS

Conclusion
Today’s organizations are working to navigate the increasingly complex IT infrastructure landscape
created by digital transformation. Simultaneously, they must contend with a changing security
landscape, constantly evolving threats, and growing compliance requirements. And while they may
realize that comprehensive identity management can help them address all of these issues, they
simply don't know how or where to start. But teams need not feel stuck. Instead, they must invest in
the education, skills, and tools that can help facilitate a holistic identity management program in order
to move past the fear and inaction, and towards safe and secure business growth.

Methodology
This Opportunity Snapshot was commissioned by SailPoint.
Forrester Consulting conducted this research with custom survey questions asked of 211 manager level and above IT and security decision
makers with influence over identity management/governance at firms in the United States, United Kingdom, and Australia.
The custom survey began and was completed in November 2018.

ABOUT FORRESTER CONSULTING


Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their Project Director:
organizations. Ranging in scope from a short strategy session to custom projects, Forrester’s Consulting services connect you Rachel Linthwaite, Market
directly with research analysts who apply expert insight to your specific business challenges. For more information, visit
Impact Consultant
forrester.com/consulting.
© 2018, Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on Contributing Research:
best available resources. Opinions reflect judgment at the time and are subject to change. Forrester®, Technographics®, Forrester’s Security and Risk
Forrester Wave, RoleView, TechRadar, and Total Economic Impact are trademarks of Forrester Research, Inc. All other
trademarks are the property of their respective companies. For additional information, go to forrester.com. [E-41801]
research group

FORRESTER.COM

Das könnte Ihnen auch gefallen