IAM Is Strategic! - RSA.com

2 downloads 116 Views 3MB Size Report
For Efficacy-focused buyers, "Strengthening identity and access security” and “Improving ability to detect insider t
Identity & Access Management in a Digitally Transformed Reality An IDC infographic sponsored by RSA

Identity and Access Management (IAM) Is a Strategic Component to Cyber Security Architecture Most Important IAM Considerations Strengthening identity and access security

63

Meeting compliance and regulatory standards

59

Improving ability to detect insider threats

55 50

Simplifying user access Ability to integrate with present IAM solutions

46

Keeping within budgets

45

Making admin easier

41

Reducing admin costs

41

Better security, compliance, and user convenience is more important than cost to IAM professionals

0 20 40 60 80 100 Average Driver Importance On 0-100 Scale

IAM Professionals Will Continue to Demand More How do you expect the importance of each of these IAM issues to change over the next 2 to 3 years? Strengthening identity and access security

56

Improving ability to detect insider threats

49

Meeting compliance and regulatory standards

All features

growing in importance

45

Simplifying user access to resources

38

Reducing admin costs

38

“Strengthening identity and access security”

37

Keeping within budgets Ability to integrate with present IAM solutions

35

Making admin easier

34 0

20

and

“Improving ability to detect insider threats”

lead the pack

40

60

80

100

% of Total

IAM Buyer Types By Solution Drivers IAM Solution Drivers ̶ Average Score on a 0 - 100 Scale 82 75 75

69

74

64

63 57

52

54

35

41 33

28

Simplifying Strengthening Ability to user access identity and integrate with access security present IAM solutions

Simplification Focused

59

38 28

27

22

Meeting Reducing Making compliance admin costs admin easier and regulatory stds

Efficacy Focused

66

49

41

26 28

Keeping within bugets

63

50

50 49

47 46

45

62

Compliance Focused

Improving ability to detect insider threats

Cost Focused

“Simplifying user access" and “Strengthening identity and access security” are the top two drivers for Simplification-focused buyers. For Efficacy-focused buyers, "Strengthening identity and access security” and “Improving ability to detect insider threats” are the top two making "Strengthening Identity and Access Security" the common thread between the two buyer types. The common thread between conveniencedriven and compliance-focused buyers: Both want to improve the ability to detect insider threats and strengthen identity and access security

Analytics and Risk-Based Authentication Are Part of Adoption Plans 76%

At least 76% of respondents are either currently using or plan to adopt behavioral analytics

or risk-based authentication in their IAM strategy

IAM Is Strategic! Expected External Spend Changes IAM in the Next 12 Months Decrease

Not Sure

6% 7%

39% Same

IAM professionals are

looking to invest

IAM professionals who are looking to increase spend outnumber those looking to decrease by more than 7 to 1

48%

Increase

Source:

Global Identity Management Assessment Survey, IDC September, 2016

Sponsored by

All IDC research is © 2017 by IDC. All rights reserved. All IDC materials are licensed with IDC’s permission and in no way does the use or publication of IDC research indicate IDC’s endorsement of RSA’s products or strategies.