Mature Access Management Curtails Breaches

 
 
By Karen A. Frenkel  |  Posted 04-07-2017 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Mature Access Management Curtails Breaches
    Next

    Mature Access Management Curtails Breaches

    Enterprise security is woefully inadequate, but it could benefit from more comprehensive and mature identity and access management.
  • Previous
    Majority Experienced Five Breaches Since 2015
    Next

    Majority Experienced Five Breaches Since 2015

    66% of the IT security decision-makers surveyed experienced an average of five or more security breaches during the past two years
  • Previous
    Most Organizations Have Immature IAMs
    Next

    Most Organizations Have Immature IAMs

    83% of the organizations surveyed don't have a mature approach to IAM.
  • Previous
    IAM Maturity Hierarchy
    Next

    IAM Maturity Hierarchy

    28% of the respondents had Level 1 IAM maturity, 30% were Level 2, 25% were Level 3 and 17% were Level 4.
  • Previous
    IAM Maturity Is Linked to Fewer Security Incidents
    Next

    IAM Maturity Is Linked to Fewer Security Incidents

    There is a correlation between implementing more IAM capabilities (especially adopting best practices with regard to privileged identity management) and a reduction in security incidents.
  • Previous
    Most Mature Firms Have Half As Many Breaches
    Next

    Most Mature Firms Have Half As Many Breaches

    Level I companies experience an average of 12.5 breaches compared to Level 4 firms, which only experience 5.7.
  • Previous
    How Six Key Areas Are Affected by Maturity Level
    Next

    How Six Key Areas Are Affected by Maturity Level

    49% of Level 4 firms (compared with only 32% of Level 1 firms) are likely to never experience a breach across six key areas: networks, servers, on-premises apps, databases, cloud apps for SaaS, and cloud apps for IaaS and PaaS.
  • Previous
    Types of Data Affected in Recent Breach
    Next

    Types of Data Affected in Recent Breach

    Identities and passwords: 57%, Customer records: 49%, Business partner records: 44%, Employee records: 41%, Proprietary intellectual property: 38%
  • Previous
    Characteristics of Level 4 Firms
    Next

    Characteristics of Level 4 Firms

    91% use an integrated IAM platform. They save 40% on AIM technology costs. They average $5 million in cost savings. 51% have improved user productivity.
 

Enterprise security is failing, and one culprit is immature identity and access management (IAM), according to a new study, "Stop the Breach: Reduce the Likelihood of an Attack Through an IAM Maturity Model," which was conducted for Centrify by Forrester Consulting. In 2016, the report states, hackers compromised more than 1 billion identities. "Despite over $75 billion spent on cyber-security in 2016, the products and services from major security companies have failed to stop breaches from occurring, and, in fact, the problem is getting worse," said Tom Kemp, CEO of Centrify. The study surveyed 203 IT security decision-makers in charge of IAM. It measured the maturity of IAMs, and assigned them point values of 1 to 4. Level 1, Identity Assurance, tries to acquire more identifiers for authentication than just passwords. Level 2, Limited Lateral Movement, advances from merely confirming a user’s identity to confirming that granting privileged access to the system is controlled and automated. Level 3, Least Privilege, limits the access level of privileged accounts. Level 4, Monitored Privileged Use, is the most tightly controlled, and monitors and logs privileged access and actions.

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register