IT and Security Leaders are Embracing Automated Identity Access Management too Late to Protect Against Hackers, Hitachi ID and Pulse Survey Shows
While many IT leaders use technology to continuously monitor their environment for identity access management cybersecurity risks, almost 100 percent have yet to put technology in place to proactively identify security risks. A recent surveyconducted by Pulse on behalf of Hitachi ID focused on exploring the gaps that exist within the current technology stacks of IT organizations and how automation is aiding their cybersecurity defenses.
Marketing Technology News: AtScale Delivers “Live” Connection Experience for Microsoft Power BI
Ransomware and cyber attacks have surged over the past year due to a variety of factors – including the work-from-home boom which resulted in new security risks and increasing irrelevance of traditional security perimeters. As businesses prepare for the post-pandemic economy and lay plans to return to the office, it’s becoming increasingly clear that hybrid work models are here to stay. As a result, IT and security leaders must re-think and re-prioritize their cybersecurity needs due to the rising risk of threats to their data.
“When it comes to security breaches, time is never on your side,” said Nicholas Brown, CEO at Hitachi ID. “And with the rising threat of cyber attacks, organizations can no longer afford to take a reactive approach to their cybersecurity postures. They must be proactive. At Hitachi ID, we’re helping IT leaders address this urgency with automated identity access management solutions to stay ahead of breaches and identify and address threats before an attack.”
Marketing Technology News: MarTech Interview with Armen Adjemian, Co-Founder and CEO at DISQO
Other survey findings include:
- 100% of IT executives believe discovering and mitigating identity and access threats is a pain point for their IT department’s resources.
- 98% of IT executives say COVID-19 has accelerated the need to improve cybersecurity
- 99% of IT executives don’t have complete visibility into their organization’s identity and access vulnerabilities and the success of their remediation efforts.
- None of the respondents have completely automated identity access management processes, while 60% say only up to half of their processes are automated.
- 68% of IT executives use an automated solution once they’ve discovered a threat.