×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!
   

Trends in Identity and Access Management: Cloud-driven Identities

November 4, 2020

The broad adoption of public cloud services demands a retooling of identity and access management programs. Perimeter security must evolve from a traditional castle and moat model to one that focuses on cloud identities inclusive of service accounts, as well as individual users and the data they access. To protect sensitive cloud-resident data, cybersecurity and IT operations teams need to work with their line-of-business teams on strengthening identity programs with both the user experience and risk in mind.

In order to gain insight into these trends, ESG surveyed 379 IT and cybersecurity professionals at organizations in North America (US and Canada) personally responsible for evaluating or purchasing identity and access management and cloud security technology products and services. This research aimed to understand the problem space, organizational responsibilities, compliance implications, and plans for securing user access to a wide portfolio of cloud services. The study will also look at the current and planned use of various authentication methods, privileged access management, device profiling, unified directories, user activity analytics, and service account protection.

Previous Flipbook
The 2020 State of Identity Security in the Cloud A Survey of Cloud Security Architects
The 2020 State of Identity Security in the Cloud A Survey of Cloud Security Architects

Key findings from our 2020 CyberArk and CSA survey of 200 cloud security architects, exploring cloud worklo...

Next Flipbook
Take Control of Cloud Permissions Sprawl
Take Control of Cloud Permissions Sprawl

In this eBook, you’ll learn how to swiftly and properly manage permissions to access key resources across a...