Insights / Research Report / The State of Identity Security: Opening Doors for the Right Entities and Locking Out the Bad Actors
July 15, 2024

The State of Identity Security: Opening Doors for the Right Entities and Locking Out the Bad Actors

Todd Thiemann
Senior Analyst, IAM & Data Security

Bill Lundell
Senior Research Director, Sponsored and Syndicated Research

Market Topics

Cybersecurity

Organizations continue to rely on identities that are susceptible to compromise, abuse, misuse, and theft. Risk is compounded by over-permissive, static access rights that provide little to no visibility into access trends or, most importantly, who is accessing what and how they are doing so.

Despite the transformation to a dynamic, amorphous perimeter, a multitude of identity security solutions and managed identity services exist. Unfortunately, organizations have been slow to pivot their security programs to an approach that incorporates identities as a foundational aspect of their cybersecurity strategy.

However, CISOs and security professionals are beginning to understand the importance of securing identities. With a decade of evidence on the risks and a plethora of identity security solutions, identity is shifting from the domain of IT operations into cybersecurity.

To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 372 IT, cybersecurity, and application development professionals at organizations in North America (US and Canada) responsible for or involved with identity security technologies and processes.

Already an Enterprise Strategy Group client? Log in to read the full report.
If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

Unparalleled insights from analysts with an "insider" perspective

From strategy and product development to competitive insights and content creation, we deliver high-quality, actionable support services.