Upload
vuduong
View
220
Download
0
Embed Size (px)
Citation preview
Identity & Access Management
Identity and Access Management (IAM) Is a Strategic Component to Cyber Security Architecture
IAM Professionals Will Continue to Demand More
IAM Buyer Types By Solution Drivers
Analytics and Risk-Based Authentication Are Part of Adoption Plans
IAM Is Strategic!
in a Digitally Transformed RealityAn IDC infographic sponsored by RSA
63
59
55
50
46
45
41
41
Strengthening identity andaccess security
Meeting compliance andregulatory standards
Improving ability todetect insider threats
Ability to integrate withpresent IAM solutions
Keeping within budgets
Making admin easier
Reducing admin costs
Average Driver Importance On 0-100 Scale
Simplifying user access
0 20 40 60 80 100
0 20 40 60 80 100
Most Important IAM Considerations
Better security, compliance,and user convenience is
more important than cost to IAM professionals
56
49
45
38
38
37
35
34
Strengthening identity andaccess security
Improving ability todetect insider threats
Meeting compliance andregulatory standards
Simplifying user accessto resources
Ability to integrate withpresent IAM solutions
Reducing admin costs
Making admin easier
Keeping within budgets
% of Total
How do you expect the importanceof each of these IAM issues to changeover the next 2 to 3 years?
All featuresgrowing in importance
lead the pack
“Strengthening identity and access security”
and “Improving ability to
detect insider threats”
IAM Solution Drivers ̶ Average Score on a 0 - 100 Scale
57
47 46
33
54
74
26 28
49
38
62
28
50
63
41
22
6366
59
27
52
45
69
28
49
41
50
82
75 75
35
64
Strengtheningidentity and
access security
Meetingcompliance
andregulatory stds
Improvingability todetectinsiderthreats
Simplifyinguser access
Ability tointegrate withpresent IAM
solutions
Keepingwithinbugets
Making admin easier
Reducing admin costs
Efficacy Focused Compliance Focused Cost FocusedSimplification Focused
“Simplifying user access" and “Strengthening identity and access security” are the top two drivers for Simplification-focused buyers.
For Efficacy-focused buyers, "Strengthening identity and access security” and “Improving ability to detect insider threats” are the top two making "Strengthening Identity and Access Security" the common thread between the two buyer types.
The common thread between convenience-driven and compliance-focused buyers:
Both want to improve the ability to detect insider threats and strengthen identity and access security
At least 76% of respondents are either currently using or plan to adopt behavioral analytics or risk-based authentication in their IAM strategy
IAM professionals are looking to invest
Expected External Spend ChangesIAM in the Next 12 Months
IAM professionals who are looking to increase spend outnumber those looking to decrease by more than 7 to 1
All IDC research is © 2017 by IDC. All rights reserved. All IDC materials are licensed with IDC’s permission and in no way does the use or publication of IDC research indicate IDC’s endorsement of RSA’s products or strategies.
39%
6% 7%
48%Same
Increase
Not SureDecrease
Global Identity Management Assessment Survey, IDC September, 2016Source: Sponsored by
76%