sb-au logo
Story image

Study: 80% of enterprises struggle to protect machine identities

Venafi announced the results of 'Securing The Enterprise With Machine Identity Protection', a June 2018 commissioned study conducted by Forrester Consulting on behalf of Venafi. 

The study focused on enterprise machine identity protection challenges and included responses from 350 senior IT security professionals.

Key findings from the study reveal that 96% of companies believe that effective protection of machine and human identities are equally important to the long-term security and viability of their companies. 

However, 80% of respondents struggle with the delivery of important machine identity protection capabilities.

Additional findings from the study include: 

Nearly half (40%) believe protecting machine identities and human identities will be equally important to their organisations over the next 12 to 24 months, while nearly as many (43%) think machine identity protection will be more important.

Seventy per cent admit they are tracking fewer than half of the most common types of machine identities found on their networks. When asked which specific machine identities they track:

  • Just 56% say cloud platform instance machine identities.
  • Only 49% say mobile device machine identities.
  • Only 49% say physical server machine identities.
  • Only 29% say SSH keys.
  • Only a quarter (25%) say machine identities of microservices and containers.

Sixty-one per cent say their biggest concern regarding poor machine identity protection management is internal data theft or loss. 

Managing user and machine identities and privileged access to business data and applications is an enormous undertaking that has serious security ramifications. 

Traditionally, the focus for identity and access management (IAM) programs has been people-centric, but recent increases in the number of machines on enterprise networks, shifts in technology and new computing capabilities have created a set of challenges that require an increased focus on protecting machine identities.

Story image
Global attack volume down, but fraud and cyber threats still going strong
“The move to digital, for both businesses and consumers, has been significant. Yet with this change comes opportunity for exploitation. Fraudsters look for easy targets: whether government support packages, new lines of credit or media companies with fewer barriers to entry."More
Link image
Webinar: Best practices for managing disparate security solutions
As budgets get more constrained, the emphasis shifts from merely finding threats to increased efficiency in managing security operations. Learn how to juggle a crowded field of solutions.More
Story image
Trend Micro receives AWS Outposts Ready designation
rend Micro solutions are now fully and demonstrably capable of integrating with Outposts deployments.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Exabeam and Code42 partner up to launch insider threat solution
The solution will give customers a fuller picture of their environment, and will leverage automated incident response to obstruct insider threat before data loss occurs.More
Story image
The importance of selecting a secure SD-WAN solution
It’s essential to adopt a secure SD-WAN solution to avoid the risks that an unsecured SD-WAN solution can introduce, writes Wavelink managing director Ilan Rubin.More