sb-au logo
Story image

SailPoint releases first identity annual report

14 Dec 2018

Enterprise identity governance provider Sailpoint Technologies has released the 2018 Identity Report, a benchmark for the industry.

In 2017, SailPoint launched a free assessment tool to help identify areas of exposure for companies, which automatically computed an “Identity Score” based on its results. 

After analysing hundreds of completed self-assessments and the correlating Identity Scores, SailPoint found that while the majority of organisations have an identity program in place, there is still much work to be done to address holes in their security programs. 

SailPoint corporate marketing vice president Kari Hanson says, “IT leaders are struggling to secure an increasingly complex IT environment, driven by the need to govern a diverse population of users, now including non-human users like software bots, as well as an explosion of both applications and data.”

“Our goal with the Identity Report, coupled with individual Identity Scores, is to provide IT leaders with a roadmap to systematically improve their security and compliance programs.”

In order to adapt to their own digital transformation, organisations are now starting to put access control front and centre in their security strategy to properly monitor who has access to what applications and data.

SailPoint’s Identity Report showed that 54% of organisations have an identity program in place.

However, SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.

Just 20% of organisations have visibility over all of their users, and seven percent have no visibility over their users at all.

Not only is this a compliance requirement for organisations today, but this puts IT teams in the impossible position of trying to secure what they cannot see.

Further, 88% of organisations are not properly governing access to data stored in files, including such common formats as Excel and PowerPoint.

In fact, only one in 10 organisations are monitoring and governing their users’ access to data in files. By leaving the corporate data stored in files and folders unmonitored and ungoverned, organisations are leaving a gaping hole in their security programs.

While the Identity Report exposes areas of risk, it also highlights an opportunity for most organisations.

Today, only 10% of organisations have fully automated identity processes in place, although many companies are working toward increased efficiencies.

For already-lean IT teams, an identity governance platform provides the visibility and control required to automate employee-driven processes like password management and access request.

This frees IT staff to focus on other risk areas and ensures employee productivity.

“The ultimate goal of any identity program is to efficiently deliver access to users, securely and confidently,” says Hanson.

“When enterprises are able to see, understand and govern their users’ access to all business applications and data, they are better protected against potential threats.

“This turns identity into a business enabler for organisations, helping them to properly secure and govern all of their digital identities at the speed of business today.”

Link image
The definitive checklist to distinguish a broken authentication system
An improper or insecure implementation of authentication is a critical web application security risk. This checklist will discern the good from the bad.More
Story image
The cybersecurity risks that come with re-onshoring Australian manufacturing
As technology such as IoT, robotic process automation (RPA) and artificial intelligence (AI) reshapes the manufacturing landscape, organisations are simultaneously put at an increased risk of a cyberattack.More
Story image
Claroty and CrowdStrike form partnership to protect industrial control system environements
The integration will deliver visibility into industrial control system (ICS) networks and endpoints, with a one-stop-shop for information technology (IT) and OT asset information directly within The Claroty Platform.More
Story image
NetMotion announces SASE platform leveraging Microsoft Azure
The platform offers integrated transport and web proxies, distributed firewalls, network access control (NAC), zero trust network access (ZTNA) or software-defined perimeters (SDP), a VPN highly optimised for mobile access, and AI-driven policy and risk analysis.More
Story image
Trend Micro integrates with AWS Network Firewall
As a Launch Partner, Trend Micro has integrated managed threat intelligence feeds from its cloud security solution to enable superior protection in line with this new AWS managed firewall service.More
Story image
Ivanti looks to a brighter future with MobileIron and Pulse Secure acquisitions
Ivanti has acquired MobileIron and Pulse Secure, with the intention of delivering intelligent and secure experiences across all devices in the ‘everywhere enterprise’. More