For Efficacy-focused buyers, "Strengthening identity and access securityâ and âImproving ability to detect insider t
Identity & Access Management in a Digitally Transformed Reality An IDC infographic sponsored by RSA
Identity and Access Management (IAM) Is a Strategic Component to Cyber Security Architecture Most Important IAM Considerations Strengthening identity and access security
63
Meeting compliance and regulatory standards
59
Improving ability to detect insider threats
55 50
Simplifying user access Ability to integrate with present IAM solutions
46
Keeping within budgets
45
Making admin easier
41
Reducing admin costs
41
Better security, compliance, and user convenience is more important than cost to IAM professionals
0 20 40 60 80 100 Average Driver Importance On 0-100 Scale
IAM Professionals Will Continue to Demand More How do you expect the importance of each of these IAM issues to change over the next 2 to 3 years? Strengthening identity and access security
56
Improving ability to detect insider threats
49
Meeting compliance and regulatory standards
All features
growing in importance
45
Simplifying user access to resources
38
Reducing admin costs
38
“Strengthening identity and access security”
37
Keeping within budgets Ability to integrate with present IAM solutions
35
Making admin easier
34 0
20
and
“Improving ability to detect insider threats”
lead the pack
40
60
80
100
% of Total
IAM Buyer Types By Solution Drivers IAM Solution Drivers ̶ Average Score on a 0 - 100 Scale 82 75 75
69
74
64
63 57
52
54
35
41 33
28
Simplifying Strengthening Ability to user access identity and integrate with access security present IAM solutions
Simplification Focused
59
38 28
27
22
Meeting Reducing Making compliance admin costs admin easier and regulatory stds
Efficacy Focused
66
49
41
26 28
Keeping within bugets
63
50
50 49
47 46
45
62
Compliance Focused
Improving ability to detect insider threats
Cost Focused
“Simplifying user access" and “Strengthening identity and access security” are the top two drivers for Simplification-focused buyers. For Efficacy-focused buyers, "Strengthening identity and access security” and “Improving ability to detect insider threats” are the top two making "Strengthening Identity and Access Security" the common thread between the two buyer types. The common thread between conveniencedriven and compliance-focused buyers: Both want to improve the ability to detect insider threats and strengthen identity and access security
Analytics and Risk-Based Authentication Are Part of Adoption Plans 76%
At least 76% of respondents are either currently using or plan to adopt behavioral analytics
or risk-based authentication in their IAM strategy
IAM Is Strategic! Expected External Spend Changes IAM in the Next 12 Months Decrease
Not Sure
6% 7%
39% Same
IAM professionals are
looking to invest
IAM professionals who are looking to increase spend outnumber those looking to decrease by more than 7 to 1
48%
Increase
Source:
Global Identity Management Assessment Survey, IDC September, 2016