Transcript

Identity & Access Management

Identity and Access Management (IAM) Is a Strategic Component to Cyber Security Architecture

IAM Professionals Will Continue to Demand More

IAM Buyer Types By Solution Drivers

Analytics and Risk-Based Authentication Are Part of Adoption Plans

IAM Is Strategic!

in a Digitally Transformed RealityAn IDC infographic sponsored by RSA

63

59

55

50

46

45

41

41

Strengthening identity andaccess security

Meeting compliance andregulatory standards

Improving ability todetect insider threats

Ability to integrate withpresent IAM solutions

Keeping within budgets

Making admin easier

Reducing admin costs

Average Driver Importance On 0-100 Scale

Simplifying user access

0 20 40 60 80 100

0 20 40 60 80 100

Most Important IAM Considerations

Better security, compliance,and user convenience is

more important than cost to IAM professionals

56

49

45

38

38

37

35

34

Strengthening identity andaccess security

Improving ability todetect insider threats

Meeting compliance andregulatory standards

Simplifying user accessto resources

Ability to integrate withpresent IAM solutions

Reducing admin costs

Making admin easier

Keeping within budgets

% of Total

How do you expect the importanceof each of these IAM issues to changeover the next 2 to 3 years?

All featuresgrowing in importance

lead the pack

“Strengthening identity and access security”

and “Improving ability to

detect insider threats”

IAM Solution Drivers ̶ Average Score on a 0 - 100 Scale

57

47 46

33

54

74

26 28

49

38

62

28

50

63

41

22

6366

59

27

52

45

69

28

49

41

50

82

75 75

35

64

Strengtheningidentity and

access security

Meetingcompliance

andregulatory stds

Improvingability todetectinsiderthreats

Simplifyinguser access

Ability tointegrate withpresent IAM

solutions

Keepingwithinbugets

Making admin easier

Reducing admin costs

Efficacy Focused Compliance Focused Cost FocusedSimplification Focused

“Simplifying user access" and “Strengthening identity and access security” are the top two drivers for Simplification-focused buyers.

For Efficacy-focused buyers, "Strengthening identity and access security” and “Improving ability to detect insider threats” are the top two making "Strengthening Identity and Access Security" the common thread between the two buyer types.

The common thread between convenience-driven and compliance-focused buyers:

Both want to improve the ability to detect insider threats and strengthen identity and access security

At least 76% of respondents are either currently using or plan to adopt behavioral analytics or risk-based authentication in their IAM strategy

IAM professionals are looking to invest

Expected External Spend ChangesIAM in the Next 12 Months

IAM professionals who are looking to increase spend outnumber those looking to decrease by more than 7 to 1

All IDC research is © 2017 by IDC. All rights reserved. All IDC materials are licensed with IDC’s permission and in no way does the use or publication of IDC research indicate IDC’s endorsement of RSA’s products or strategies.

39%

6% 7%

48%Same

Increase

Not SureDecrease

Global Identity Management Assessment Survey, IDC September, 2016Source: Sponsored by

76%

Top Related