Managing Complexity in Identity & Access Management

Size: px
Start display at page:

Download "Managing Complexity in Identity & Access Management"

Transcription

1 Managing Complexity in Identity & Access Management Sponsored by RSA Aveksa Independently conducted by Ponemon Institute LLC Publication Date: August 2013 Ponemon Institute Research Report

2 Part 1. Executive Summary Managing Complexity in Identity & Access Management Ponemon Institute: August 2013 When employees, temporary employees, contractors and partners have inappropriate access rights to information resources that is, access that violates security policies and regulations or that is far more expansive for their current jobs companies are subject to serious compliance, business and security risks. Unfortunately, for many organizations the process of ensuring appropriate access to information resources is very complex. Ideally, the appropriate assignment of access rights ensures that users of information resources which include applications, files and data have no more or less rights to specific information resources than needed to do their particular job function within an organization. It also helps ensure that end users right to use or view business information resources does not violate compliance regulations as required by financial controls legislation, various data protection and privacy regulations, and industry mandates. 1 The overall objective of this study conducted by Ponemon Institute and sponsored by Aveksa is to determine how well organizations are managing complexity. To do this, we focused on questions about their current identity and access management (IAM) processes, effectiveness of the processes and factors that contribute to complexity. The following are key findings from this research Changing access rights is a lengthy and burdensome process. Seventy percent do not believe or are uncertain that their organization typically fulfills access changes in response to new employees, transfers to a new role or terminated employees in a timely manner such as within one day. Only onethird of respondents say that access requests are immediately checked against security policies before access is approved and assigned. Strict enforcement of IAM policies is seen lacking. Fifty-three percent of respondents see the need for stricter enforcement. Better Investments in IAM technologies are needed. Fifty-three percent say their organizations don t make appropriate investments in technologies that manage and govern end-user access to information resources. The effects of IAM failure can be costly. Respondents report that the three biggest costs caused by the failure of IAM to prevent unauthorized access are: the cost of users idle time and lost productivity, lost revenue or income and cost of technical support, including forensics and investigative operations. They estimate that on average the total potential cost exposure that could result from all IAM failures over the course of one year is approximately $105 million. Access rights are difficult to manage. Sixty-two percent of respondents believe their organizations IAM activities are overly complex and difficult to manage. On average, organizations have more than 300 information resources such as applications, databases, networks, servers, hosts, file shares that require the assignment of user access rights. The number of access requests total on average 1,200 each month. These requests include requesting new access, changes to existing access rights or revocation of access due to termination. Why IAM processes are complex. In addition to the number of information resources requiring assignment of user access rights and the requests for access rights, organizational changes contribute to complexity. These can range from the use of cloud applications, BYOD and the growth of unstructured data that is difficult to control. 1 For example, Sarbanes-Oxley, Euro-SOX, CA , MAR, GLBA, PCI, HIPAA/HITECH, PIPEDA, MA CMR17, EU Data Protection Directive, Basel II, Solvency II, FFIEC, FERC/NERC, FISMA and others. Ponemon Institute Research Report Page 1

3 Growth of unstructured data is a problem ignored. Less than half of respondents (48 percent) say they use IAM to manage access to unstructured data despite their belief that the growth of this type of data is making the process of managing access rights more complex. Moreover, if they are currently not using IAM to manage access to unstructured data, most have no plans in the future to do so. Organizations lack visibility into what end-users are doing. Do organizations have adequate knowledge and visibility into end-user access? Fifty-six percent of respondents are either not confident or unsure that they can ascertain that user access is compliant with policies. The biggest reason is that they cannot create a unified view of user access across the enterprise. Certain situations reduce IAM effectiveness. IAM processes are most often affected by the availability of automated IAM technologies, adoption of cloud-based applications and the constant turnover (ebb and flow) of temporary employees, contractors, consultants and partners. Access to sensitive data in the cloud is a concern. The majority of organizations are using SaaS applications to support key business processes. Despite the popularity of these applications, most respondents (78 percent) have some level of concern about end-user access to sensitive data in these applications, What is your organization s level of complexity? In this research, respondents were asked to rate the level of IAM complexity and effectiveness in their organizations. In the context of this research, complexity often reflects the size of the organization, number of access requests, growth of unstructured data, higher rates of cloud usage and the number of information resources that require the assignment of user access rights. No organization can avoid complexity. The goal in managing complexity is to have the right mix of people, processes and technologies in place to manage it appropriately and minimize compliance and business risks. Our analysis also shows that respondents who believe their organizations are effective in their IAM processes also have lower complexity. Following are the characteristics of companies experiencing a low, medium and high level of complexity in their IAM processes. Based on these descriptions, it seems that a medium level of complexity is the best approach to IAM. A low level of complexity. These companies tend to have a smaller headcount and are more likely to use manual or homegrown access certification systems. A low to medium level of complexity. These companies are better able to estimate the annual cost of IAM systems and/or processes and know the total number of orphan accounts. Again, the headcount size can keep complexity to a lower level. A medium level of complexity. These companies are better able to know the number of potential high-risk users, are more likely to use IAM systems or processes to manage and regulate access requests to unstructured data assets, have well-defined policies and procedures relating to access governance across the enterprise and more likely to assign IAM accountability to business unit management (LOBs) A high level of complexity. These companies are more likely to define their organizations access governance process as a set of disconnected or disjointed activities, assign IAM accountability to the IT organization (CIO), have a higher number of access requests and a higher rate of cloud usage for critical business applications. Ponemon Institute Research Report Page 2

4 Part 2. Key Findings We surveyed 678 experienced US IT and IT security practitioners. To ensure knowledgeable responses, all respondents have a role in providing end-users access to information resources in their organizations. These include: responding to access requests, supporting the delivery of access, supporting the enforcement of access policies, reviewing and certifying access compliance and installing technologies related to access rights management. In this section, we provide an analysis of the key findings according to the following themes. Perceptions about the state of IAM practices State of IAM practices Complexity in managing IAM processes Cloud computing usage and complexity The relationship between complexity and effective IAM processes The majority of respondents believe their organizations IAM processes are not very successful or effective. Figure 1, presents the findings of perceptions ranging from strongly agree to unsure about the following IAM practices. Timeliness of access changes. Seventy percent do not agree or are unsure their organization typically fulfills access changes in response to new employees, transfers to a new role or terminated employees in a timely manner such as within one day. Verification of access requests with security policies. Two-thirds of respondents say that access requests are not immediately checked against security policies before the access is approved and assigned or are unsure. Strict enforcement of IAM policies. Fifty-three percent say that IAM policies are not in place and strictly enforced or are unsure. However, 47 percent agree their current policies are effective. Investment in IAM technologies. Fifty-three percent of respondents say their organizations do not make appropriate investments in technologies that manage and govern end-user access to information resources or they are unsure. Figure 1. Perceptions about IAM practices Investments in technologies are made that manage and govern end-user access to information resources Identity & access management policies are in-place and are strictly enforced Access requests are immediately checked against security policies before access is approved and assigned Access changes are typically fulfilled within one business day. 22% 25% 23% 16% 14% 21% 26% 21% 16% 16% 14% 19% 25% 23% 19% 11% 19% 22% 18% 30% 0% 5% 15% 20% 25% 30% 35% Strongly agree Agree Disagree Strongly disagree Unsure Ponemon Institute Research Report Page 3

5 State of IAM practices Business unit managers assign access rights. Business unit managers are most involved in determining access to sensitive and confidential information, according to Figure 2. This function is followed by information technology operations. Rarely involved is the IT security function. Figure 2. Responsibility for granting end-user access rights Two responses permitted Business unit managers 63% Information technology operations 55% Compliance department 30% Human resource department Application owners 17% 21% Information security department Unsure 4% Delegating assignment of access rights to business units without their control of IAM policies explains why the process for assigning access to information resources is not well coordinated. As shown in Figure 3, it is most common is to have multiple disconnected processes across the organization. Most organizations do not have well-defined policies that are controlled by the business unit management (10 percent of respondents). Without such control, changes are not often validated to confirm they were performed properly, according to 41 percent of respondents and 5 percent are unsure. Figure 3. Process for granting end-user access rights One response permitted 0% 20% 30% 40% 50% 60% 70% Multiple disconnected processes across the organization 43% Determined by well-defined policies that are centrally controlled by corporate IT 20% An ad hoc process A hybrid process that includes IT and business unit management Determined by well-defined policies that are controlled by business unit management 11% 12% Unsure 4% 0% 5% 15% 20% 25% 30% 35% 40% 45% 50% Ponemon Institute Research Report Page 4

6 To certify user access to information resources, organizations use homegrown access certification systems followed by manual processes and commercial off-the-shelf automated solutions, according to Figure 4. Figure 4. Processes to certify user access to information resources Two responses permitted Homegrown access certification systems 65% Manual process 53% Commercial off- the-shelf automated solutions 45% IT help desk 30% Unsure 5% Other 2% 0% 20% 30% 40% 50% 60% 70% Figure 5 shows that manually-based identity and access controls followed by technology-based identity and access controls are mostly used to detect the sharing of system administration access rights or root level access rights by privileged users. Figure 5. Detection of how privilege users are sharing root level access rights One response permitted Manually-based identity and access controls 39% Technology-based identity and access controls Access to sensitive or confidential information is not really controlled 18% 21% We are unable to detect A combination of technology and manually-based identity and access controls 9% Unsure 3% 0% 5% 15% 20% 25% 30% 35% 40% 45% Ponemon Institute Research Report Page 5

7 The complexity of IAM processes The effects of IAM failure can be costly. Respondents report that the three biggest costs caused by the failure of IAM to prevent unauthorized access are: the cost of users idle time and lost productivity, lost revenue or income and cost of technical support including forensics and investigative operations. They estimate that on average the total potential cost exposure that could result from all IAM failures over the course of one year is approximately $105 million. The following findings reveal the challenges organizations face in overcoming complexity and achieving effectiveness. Access rights are difficult to manage. Sixty-two percent of respondents believe their organizations IAM activities are overly complex and difficult to manage. On average, organizations have more than 300 information resources such as applications, databases, networks, servers, hosts, file shares that require the assignment of user access rights. The number of access requests total on average 1,200 each month. These requests include requesting new access, changes to existing access rights or revocation of access due to termination. Figure 6 reports how respondents rated the complexity of their organizations IAM processes on a scale of 1 (low complexity) to 10 (high complexity). The average rating is about 8. Based on this scale, 74 percent rate their organizations as highly complex. Figure 6. Complexity of IAM processes Complexity is measured using a 10-point scale 50% 45% 40% 35% 30% 25% 20% 15% 5% 0% 9% 7% 1 to 2 3 to 4 5 to 6 7 to 8 9 to 10 31% 43% Ponemon Institute Research Report Page 6

8 Uncertainty as to how much is spent on IAM. Another indication of the complexity of IAM is that most respondents do not know what their organizations spend on IAM systems and processes (Figure 7). According to the findings, on average respondents estimate that in the past 12 months companies spent $3.5 million on IAM. Figure 7. Do you know what your organization spends on IAM systems and processes? 50% 45% 40% 35% 30% 25% 20% 15% 5% 0% 43% 44% 13% Yes No Unsure Why are IAM processes complex? In addition to the number of information resources requiring assignment of user access rights and the requests for access rights, organizational changes contribute to complexity. These can range from the use of cloud applications, BYOD and the growth of unstructured data that is difficult to control. Figure 8 shows what factors are making the job of managing IAM increasingly difficult. Figure 8. Factors that complicate IAM practices Very significant and significant response Rapid growth of unstructured data 45% 46% Expanded use of mobile devices 44% 45% Expanded regulatory and compliance requirements 32% 36% Access to cloud-based applications and data 33% 34% 0% 20% 30% 40% 50% 60% 70% 80% 90% 100% Very significant Significant Ponemon Institute Research Report Page 7

9 Growth of unstructured data is a problem ignored. Less than half of respondents (48 percent) say they use IAM to manage access to unstructured data despite their belief that the growth of this type of data is making the process of managing access rights more complex. Moreover, if they are currently not using IAM to manage access to unstructured data, most have no plans in the future to do so. Organizations lack visibility into what end-users are doing. Do organizations have adequate knowledge and visibility into end-user access? Fifty-six percent of respondents are either not confident or unsure that they can ascertain that user access is compliant with policies. As shown in Figure 9, the biggest reason is that they cannot create a unified view of user access across the enterprise. Figure 9. Why organizations lack visibility about end-users Only one response permitted Can t create a unified view of user access across the enterprise 51% Can t keep up with the changes occurring to our organization s information resources 20% Can t apply controls that span across information resources 20% Visibility only into user account information but not entitlement information 9% 0% 20% 30% 40% 50% 60% Number of orphan accounts and high-risk users are often invisible to IAM. There are other indicators of uncertainty about the state of IAM. Specifically, respondents admit that they do not know or are unsure of the number of orphan accounts in their organization (60 percent of respondents). If they are able to estimate the percentage, it averages almost one-third of all accounts within the organization. Forty-three percent do not know the percentage of high-risk users and 8 percent are unsure. Accordingly, less than half of respondents (49 percent) know the percentage of all users who would be considered high-risk and they estimate it to be 25 percent of all users. Ponemon Institute Research Report Page 8

10 Certain situations reduce IAM effectiveness. As shown in Figure 10, IAM processes are most often affected by the availability of automated IAM technologies, adoption of cloud-based applications and the constant turnover (ebb and flow) of temporary employees, contractors, consultants and partners. Figure 10. Affect on IAM process Very significant and significant response Adoption of cloud-based applications 33% 42% Availability of automated IAM technologies 38% 29% Constant turnover of temporary employees, contractors, consultants and partners Constant changes to the organization as a result of mergers and acquisitions, divestitures, reorganizations and downsizing 23% 23% 28% 25% 0% 20% 30% 40% 50% 60% 70% 80% Very significant Significant The situations just described explain the complexity in delivering access to end-users. The problems created by complexity are shown in Figure 11. Specifically, it takes too long to deliver access, the process is burdensome and it is hard to keep pace with access change requests. Figure 11. Key problems in delivering access to end-users Three responses permitted Takes too long to deliver access to users Burdensome process for business users requesting access Cannot keep pace with the number of access change requests Lack of a consistent approval process for access and a way to handle exceptions Too expensive Can t apply access policy controls at point of change request Difficult to audit and validate access changes Too much staff required No common language exists for how access is requested Delivery of access to users is staggered 21% 18% 16% 12% 31% 40% 47% 50% 55% Other 0% 0% 20% 30% 40% 50% 60% Ponemon Institute Research Report Page 9

11 Cloud computing usage and IAM complexity Access to sensitive data in the cloud is a concern. The majority of organizations are using SaaS applications to support key business processes. Despite the popularity of these applications, most respondents (78 percent) have some level of concern about end-user access to sensitive data in these applications, as shown in Figure 12. Figure 12. Concern about using cloud-based SaaS applications for key business processes 35% 30% 31% 29% 25% 22% 20% 18% 15% 5% 0% Yes, very concerned Yes, concerned Yes, somewhat concerned No, not concerned The primary obstacles to using a pure cloud-based SaaS IAM solution are shown in Figure 13. Main barriers are the ability to control access to sensitive application data (76 percent) and measure security risk (65 percent). Only 8 percent of respondents do not see any obstacles to adoption. Figure 13. Obstacles to adopting a SaaS IAM solution More than one response permitted Ability to control access to sensitive application data 76% Ability to measure security risk 65% Ability to transfer data from on-premise (legacy) systems to the cloud Availability of SaaS solution 48% 47% Ability to obtain approvals from IT and IT security functions 20% None 8% Other 3% 0% 20% 30% 40% 50% 60% 70% 80% Ponemon Institute Research Report Page 10

12 Significant cross-tabulations on IAM complexity Respondents were asked to rate their organizations in terms of (1) complexity of IAM operations and (2) the effectiveness of IAM systems and controls. Both complexity and effectiveness are measured using a 10-point scale from low (1) to high (10) with a median at 5.5. The distribution of responses shown in Figure 14 allows us to compute overall average values for both variables. The average complexity rating is above the median at 7.8, while the average effectiveness rating is below the median at 4.0. The Figure below reveals that the majority of respondents believe their IAM processes are very complex. Seventy-four percent believe the level of complexity is above the median. Respondents also do not believe their IAM processes are very effective. Again, the majority (55 percent) of respondents rate the effectiveness below the median of 4.0. Figure 14. Respondents ratings of IAM complexity and effectiveness Both complexity and effectiveness are measured using a 10-point scale 50% 45% 40% 35% 30% 25% 20% 15% 5% 0% 43% 31% 9% 7% 1 to 2 3 to 4 5 to 6 7 to 8 9 to 10 50% 45% 40% 35% 30% 25% 20% 15% 5% 0% 41% 28% 15% 11% 5% 1 to 2 3 to 4 5 to 6 7 to 8 9 to 10 Level of IAM complexity Level of IAM effectiveness Ponemon Institute Research Report Page 11

13 Figure 15 shows the average effectiveness rating according to five ascending complexity levels. We see an inverted U-shape relationship, where organizations reporting the lowest effectiveness level at 3.12 also have the lowest level of complexity. In contrast, organizations at the highest level of effectiveness (5.53) are in the middle range of the 10-point complexity scale. This pattern suggests complexity has a negative impact on the deployment of IAM, but only for highly effective users. Figure 15. Interrelationship between IAM complexity and effectiveness Both complexity and effectiveness are measured using a 10-point scale Level of IAM effectiveness to 2 3 to 4 5 to 6 7 to 8 9 to 10 Level of IAM complexity Figure 16 shows the average complexity rating according to six ascending headcount (size) levels. As can be seen, there is a positive relationship between organizational size and IAM complexity. Organizations with less than 500 employees report the lowest average complexity level at Organizations with headcount above 25,000 and 75,000 employees have the highest levels of complexity levels at Figure 16. Interrelationship between IAM complexity and organizational headcount (size) Complexity is measured using a 10-point scale Less than to 1,000 1,001 to 5,000 5,001 to 25,000 25,001 to 75,000 Average level of IAM complexity Ponemon Institute Research Report Page 12

14 Part 3. Conclusion: Managing complexity and achieving effectiveness Our findings suggest that IT staffs cannot keep up with the constant change to information resources, regulations and user access requirements. Many organizations are facing significant information risks because the process of delivering access is lengthy and burdensome and access rights are not current. In addition, the approaches to access management tend to be ad hoc or inconsistent and contribute to ineffectiveness. The following are suggestions for overcoming complexity and reducing IAM failures. Implement a well-managed enterprise-wide access governance process that keeps employees, temporary employees and contractors from having too much access to information assets. At the same time, do not hinder individuals access to information resources critical to their productivity. To do this, organizations must understand what role-based access individuals need. Further, changes to users roles must be managed to ensure they have current and correct access rights. Create well-defined business policies for the assignment of access rights. These policies should be centrally controlled to ensure they are enforced in a consistent fashion across the enterprise. They also should encourage collaboration among different internal groups. Track and measure the ability to enforce user access policies. This includes measuring the effectiveness of processes to manage changes to users roles; revoking access rights upon an individual s termination; monitoring access rights of privileged users accounts; and monitoring segregation of duties. Ensure that accountability for access rights is assigned to the business unit that has domain knowledge of the users role and responsibility. Become proactive in managing access rights. Instead of making decisions on an ad hoc basis based on decentralized procedures, build a process that enables the organization to have continuous visibility into all user access across all information resources and entitlements to those resources. Technologies that automate access authorization, review and certification will limit the risk of human error and negligence. Bridge the language gap between IT staff and business managers to encourage a common understanding of how to express access rights and entitlements. This is especially important for the access request and access certification processes, in which gaps can cause unnecessary delays in access delivery or allows inappropriate access. Pursue extending controls over access to all information resources similar to those required under regulations (SOX, PCI, etc). This entails organizations broadening their view of risk management beyond compliance with specific regulations. Organizations need to go beyond the minimum requirements for compliance and think about risk in the broadest terms with the widest coverage. This is especially true because the loss of corporate IP is typically not covered under regulations or industry mandates. Extend the organizational access governance framework beyond the firewall to cloud computing and other IT outsourcing/software-as-a-service (SaaS) providers. Ponemon Institute Research Report Page 13

15 Part 4. Methods A random sampling frame of 19,005 experienced US IT and IT security practitioners located in all regions of the United States were selected as participants to this survey. All respondents have a role in providing end-users access to information resources in their organizations. As shown in Table 1, 753 respondents completed the survey. Screening and reliability checks removed 75 surveys. The final sample was 678 surveys (or a 3.6 percent response rate). Table 1. Sample response Freq Sampling frame 19, % Total returns % Rejected and screened surveys % Final sample % Pie Chart 1 reports the respondent s organizational level within participating organizations. By design, 55 percent of respondents are at or above the supervisory levels. Pie Chart 1. Current position within the organization 31% 8% 2% 3% 2% 3% 3% 14% 20% C-level SVP/VP Director Manager Supervisor Technician Architect Staff Contractor Other 15% Ponemon Institute Research Report Page 14

16 Pie Chart 2 reports the industry segments of respondents organizations. This chart identifies financial services (16 percent) as the largest segment, followed by government (13 percent) and healthcare and retail, both at 10 percent. Pie Chart 2. Industry distribution of respondents organizations 3% 4% 6% 3% 2% 2% 6% 2% 2% 2% 4% Financial services 16% Government 6% 7% As shown in pie chart 3, 58 percent of respondents are from organizations with a global headcount of 1,000 or more employees. Pie chart 3. Worldwide headcount of the organization 13% Healthcare Retail Services Consumer products Manufacturing Technology Pharmaceuticals Energy & utilities Telecom Insurance Education & research Entertainment & media Hospitality Transportation Other 8% 4% 18% Less than % 500 to 1,000 1,001 to 5,000 5,001 to 25,000 24% 25,001 to 75,000 More than 75,000 29% Ponemon Institute Research Report Page 15

17 Part 5. Caveats to this study There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most web-based surveys. Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the instrument. Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are IT or IT security practitioners. We also acknowledge that the results may be biased by external events such as media coverage. We also acknowledge bias caused by compensating subjects to complete this research within a holdout period. Finally, because we used a web-based collection method, it is possible that non-web responses by mailed survey or telephone call would result in a different pattern of findings. 0BSelf-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide a truthful response. Ponemon Institute Research Report Page 16

18 Appendix: Detailed Survey Results The following tables provide the frequency or percentage frequency of responses to all survey questions contained in this study. All survey 678 responses were captured in June Sample response Freq Sampling frame 19, % Total returns % Rejected and screened surveys % Final sample % Part 1. Screening S1. What best describes your role in providing end-users access to information resources in your organization? Please check all that apply. Respond to access requests 56% Support the delivery of access 37% Support the enforcement of access policies 61% Responsible for review and certification of access compliance 36% Install technologies relating to access rights management 39% Other (please describe) 2% None of the above (stop) 0% Total 231% Part 2. Attributions. Please rate Q1a to Q1d using the scale provided below each statement. Strongly agree Agree Q1a. Identity & access management policies are in-place and are strictly enforced in my organization. 21% 26% Q1b. My organization s Identity & access management activities are overly complex and difficult to manage. 29% 33% Q1c. My organization makes appropriate investments in technologies that manage and govern end-user access to information resources. 22% 25% Q1d. My organization typically fulfills access changes (i.e. new employees, transfers to a new role, terminated employees, etc.) within one business day. 11% 19% Q1e. In my organization, access requests are immediately checked against security policies before the access is approved and assigned. 14% 19% Part 3. Complexity of identity & access management practices Q2. Please rate your organization s identity & access management processes in terms of its level of complexity, where 1 = low complexity to 10 = high complexity 1 to 2 9% 3 to 4 7% 5 to 6 7 to 8 31% 9 to 10 43% How do the following factors contribute to the complexity of identity & access management practices within your organization? Very significant impact to no impact Very significant Significant Q3a. Access to cloud-based applications and data 33% 34% Q3b. Expanded use of mobile devices (including BYOD) 44% 45% Q3c. Expanded regulatory and compliance requirements 32% 36% Q3d. Rapid growth of unstructured data 45% 46% Ponemon Institute Research Report Page 17

19 Q4. Approximately, how many information resources (applications, databases, networks, servers, hosts, file shares) within your organization require the assignment of user access rights? Less than 5 1% Between 5 and 25 3% Between 26 and 50 23% Between 51 and % Between 101 and 1,000 25% More than 1,000 12% Q5. On a monthly basis, how many access requests are made (i.e. requesting new access, changes to existing access rights or revocation of access due to termination)? Less than 50 1% Between 51 and % Between 201 and % Between 501 and 1,000 28% Between 1001 and 5,000 19% More than 5,000 5% Q6a. Do you know the total annual costs of IAM systems and/or processes incurred by your organization? Yes 43% No 44% Unsure 13% Q6b. Please estimate the total cost of IAM incurred by your organization over the past 12 months. Please include all costs including licensing and maintenance fees, personnel costs, software solutions and other tools. Zero 0% Less than $10,000 2% $10,001 to $100,000 3% $100,001 to $250,000 17% $250,001 to $500,000 31% $500,001 to $1,000,000 22% $1,000,001 to $5,000,000 12% $5,000,001 to $10,000,000 6% $10,000,001 to $25.000,000 5% $25,000,001 to $50,000,000 1% $50,00,001 to $100,000,000 0% More than $100,000,000 1% Q7a. Do you know the number of orphan accounts within your organization today? Yes 40% No 54% Unsure 6% Ponemon Institute Research Report Page 18

20 Q7b. If yes, please estimate the percentage of orphan accounts relative to total (all) accounts within your organization. Less than 1% 0% 1% to 5% 3% 6% to 8% 11% to 20% 11% 21% to 30% 13% 31% to 40% 25% 41% to 50% 19% More than 50% 11% Cannot determine Q8a. Do you know the number or percentage of high-risk users? Yes 49% No 43% Unsure 8% Q8b. If yes, please estimate the percentage of high-risk users relative to all users within your organization. Less than 1% 0% 1% to 5% 6% 6% to 8% 11% to 20% 20% 21% to 30% 22% 31% to 40% 24% 41% to 50% 9% More than 50% 2% Cannot determine 9% Q9. Please rate the relative success or effectiveness of your organization s IAM processes where 1 = not effectiveness to 10 = very effective. 1 to 2 15% 3 to 4 41% 5 to 6 28% 7 to 8 11% 9 to 10 5% Q10. Do you presently use IAM to manage access to unstructured data? Yes 48% No 43% Unsure 9% Q11. If no, do you plan to use IAM to understand apps and unstructured data? Yes, within the next 12 months 19% Yes, more than 12 months 13% Yes, within 24 months 11% Yes, more than 24 months 3% No 54% Ponemon Institute Research Report Page 19

21 Q12. What IT infrastructure do you want your organization s IAM to support? IT security management (ITSM) 83% Security information and event management (SIEM) 61% Network & traffic intelligence 55% Data loss prevention (DLP) 55% Intrusion prevention (IPS) & detection (IDS) systems 40% Governance, risk management and compliance (GRC) tools 44% Other (please specify) 4% Total 342% Q13. What best describes the process for assigning access to information resources in your organization today? Please select one best choice. An ad hoc process 12% Determined by well-defined policies that are centrally controlled by corporate IT 20% Determined by well-defined policies that are controlled by business unit management A hybrid process that includes IT and business unit management 11% Multiple disconnected processes across the organization 43% Unsure 4% Q14. Who is responsible for making the decision to grant an end-user access to information resources? Please select the top two choices. Information technology operations 55% Information security department Compliance department 30% Business unit managers 63% Application owners 17% Human resource department 21% Unsure 4% Total 200% Q15. What processes are used for certifying user access to information resources. Please select the top two choices. Manual process 53% Homegrown access certification systems 65% Commercial off- the-shelf automated solutions 45% IT help desk 30% Unsure 5% Other 2% Total 200% Q16. Are changes to access validated to confirm they were performed properly? Yes, all changes 11% Yes, most changes 28% Yes, some changes 15% No 41% Unsure 5% Ponemon Institute Research Report Page 20

22 Q17. How do you detect the sharing of system administration access rights or root level access rights by privileged users? Please select only one top choice. Technology-based identity and access controls 21% Manually-based identity and access controls 39% A combination of technology and manually-based identity and access controls 9% Access to sensitive or confidential information is not really controlled 18% Unsure 3% We are unable to detect Q18a. Are you confident your organization can ascertain that user access is compliant with policies? Yes, very confident 18% Yes, confident 26% No, not confident 50% Unsure 6% Q18b. If no, please select one main reason. We can t create a unified view of user access across the enterprise 51% We only have visibility into user account information but not entitlement information 9% We can t apply controls that span across information resources 20% We can t keep up with the changes occurring to our organization s information resources (on-boarding, off- boarding and outsourcing for management) 20% Part 4. Cloud computing Q19. Does your organization use SaaS applications to support key business processes? Yes 71% No 25% Unsure 4% Q20. Approximately, what proportion of your organization s key business applications are SaaS-based? None 5% Less than 31% 11% to 50% 32% 51% to 75% 76 % to 99% 11% All (100%) 2% Cannot determine 9% Q21. From an IAM perspective, are you concerned using cloud-based SaaS applications for key business processes? Yes, very concerned 31% Yes, concerned 29% Yes, somewhat concerned 18% No, not concerned 22% Ponemon Institute Research Report Page 21

23 Q22. What obstacles, if any, does your organization face if it decided to use a pure cloud-based SaaS IAM solution? Please select all that apply. Ability to obtain approvals from IT and IT security functions 20% Ability to measure security risk 65% Ability to control access to sensitive application data 76% Ability to transfer data from on-premise (legacy) systems to the cloud 48% Availability of SaaS solution 47% Other (please specify) 3% None (no obstacles) 8% Total 267% Part 5. Problems & remedies Q23. What are the key problems you face in delivering access to end-users within your organization? Please select the top three choices. Takes too long to deliver access to users (not meeting our SLAs with the business) 55% Too expensive 31% Too much staff required 16% Can t apply access policy controls at point of change request 21% Delivery of access to users is staggered (not delivered at the same time) Cannot keep pace with the number of access change requests that come in on a regular basis 47% Lack of a consistent approval process for access and a way to handle exceptions 40% Difficult to audit and validate access changes 18% Burdensome process for business users requesting access 50% No common language exists for how access is requested that will work for both IT and the business 12% Other 0% Total 300% How will each of the following situations affect your organization s IAM process? Please use the scale provided below each item from very significant impact to no affect. Very significant impact to no impact Very significant Significant Q24a. Adoption of cloud-based applications 33% 42% Q24b. The constant turnover (ebb and flow) of temporary employees, contractors, consultants and partners 23% 28% Q24c. Availability of automated IAM technologies 38% 29% Q24d. Constant changes to the organization as a result of mergers and acquisitions, divestitures, reorganizations and downsizing 23% 25% Part 6. Cost exposure estimation Q25. Following are six cost categories caused by the failure of IAM to prevent unauthorized access to systems and/or secure places. Please rank each category based on the financial impact to your organization. 1 = most significant financial impact and 6 = least significant financial impact. Average rank Rank order Cost of technical support including forensics and investigative operations Cost of users idle time and lost productivity because of IAM failure Cost resulting from the organization s response to information misuse or theft Cost associated with legal and regulatory actions Revenues or income lost because of IAM failure Cost associated with reputation and brand damage because of IAM failure Average 3.50 Ponemon Institute Research Report Page 22

24 Q26. Please approximate the total potential cost exposure that could result from all IAM failures over the course of one year. Less than $1,000,000 5% $1,000,001 to $5,000,000 8% $5,000,001 to $10,000,000 $10,000,001 to $25.000,000 12% $25,000,001 to $50,000,000 16% $50,00,001 to $100,000,000 12% $100,000,001 to $250,000,000 13% $250,000,001 to $500,000,000 11% More than $500,000,000 2% Cannot determine 11% Part 7. Your role D1. What organizational level best describes your current position? C-level 3% SVP/VP 3% Director 14% Manager 20% Supervisor 15% Technician 31% Architect 8% Staff 2% Contractor 3% Other (please specify) 2% D2. What industry best describes your organization s industry focus? Agriculture & food service 1% Chemicals 0% Consumer products 6% Defense 1% Education & research 2% Energy & utilities 3% Entertainment & media 2% Financial services 16% Government 13% Healthcare Hospitality 2% Insurance 2% Manufacturing 6% Medical devices 1% Non-profit 1% Pharmaceuticals 4% Retail Services 7% Technology 6% Telecom 3% Transportation 2% Other (please specify) 0% Ponemon Institute Research Report Page 23

25 D3. What is the worldwide headcount of your organization? Less than % 500 to 1,000 24% 1,001 to 5,000 29% 5,001 to 25,000 17% 25,001 to 75,000 8% More than 75,000 4% Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or organization identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute Research Report Page 24

Global Trends in Identity Governance & Access Management: Brazil

Global Trends in Identity Governance & Access Management: Brazil Global Trends in Identity Governance & Access Management: Brazil Sponsored by Micro Focus Independently conducted by Ponemon Institute LLC Publication Date: August 2016 Ponemon Institute Research Report

More information

HSM Global Market Study

HSM Global Market Study HSM Global Market Study Sponsored by HP Atalla Independently conducted by Ponemon Institute LLC Publication Date: July 2014 Ponemon Institute Research Report HSM Global Market Study Ponemon Institute,

More information

Security & Compliance Trends in Innovative Electronic Payments

Security & Compliance Trends in Innovative Electronic Payments Security & Compliance Trends in Innovative Electronic Payments Independently conducted by Ponemon Institute LLC Publication Date: October 2014 Ponemon Institute Research Report Security & Compliance Trends

More information

Managing Insider Risk through Training & Culture. Sponsored by Experian Data Breach Resolution

Managing Insider Risk through Training & Culture. Sponsored by Experian Data Breach Resolution Managing Insider Risk through Training & Culture Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

Challenges & Trends in Public Sector IT Operations: United States DevOps fuels optimism despite declining confidence

Challenges & Trends in Public Sector IT Operations: United States DevOps fuels optimism despite declining confidence Challenges & Trends in Public Sector IT Operations: United States DevOps fuels optimism despite declining confidence Independently conducted by Ponemon Institute Sponsored by Splunk Publication Date: July

More information

THE TRUE COST OF COMPLIANCE WITH DATA PROTECTION REGULATIONS BENCHMARK STUDY OF MULTINATIONAL ORGANIZATIONS

THE TRUE COST OF COMPLIANCE WITH DATA PROTECTION REGULATIONS BENCHMARK STUDY OF MULTINATIONAL ORGANIZATIONS THE TRUE COST OF COMPLIANCE WITH DATA PROTECTION REGULATIONS BENCHMARK STUDY OF MULTINATIONAL ORGANIZATIONS Sponsored by Globalscape Independently conducted by Ponemon Institute LLC Publication Date: December

More information

Identity Imperative for the Open What IT Users & Business Users Think about Bring Your Own Identity (BYOID)

Identity Imperative for the Open What IT Users & Business Users Think about Bring Your Own Identity (BYOID) The Identity Imperative for the Open Enterprise: What s & s Think about Bring Your Own Identity (BYOID) Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: July

More information

Detect. Resolve. Prevent. Assure.

Detect. Resolve. Prevent. Assure. Detect. Resolve. Prevent. Assure. The Emerging Mandate: Continuous Monitoring of Enterprise Business Controls to Achieve Risk Intelligence In every industry, companies of every size are witnessing unprecedented

More information

2016 Cost of Data Breach Study: United States

2016 Cost of Data Breach Study: United States 2016 Cost of Data Breach Study: United States Benchmark research sponsored by IBM Independently conducted by Ponemon Institute LLC June 2016 Ponemon Institute Research Report 2016 1 Cost of Data Breach

More information

Securing the Mobile, Cloud-connected Enterprise

Securing the Mobile, Cloud-connected Enterprise Securing the Mobile, Cloud-connected Enterprise What is a Mobile, Cloud-connected Enterprise? The rise of mobile users and apps, coupled with the continued growth in software as a service (SaaS), has transformed

More information

RSA Identity Management & Governance

RSA Identity Management & Governance RSA Identity Management & Governance 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity Intelligence

More information

Identity Governance and Administration

Identity Governance and Administration Identity Governance and Administration Background In the early days of identity management, organizations implemented the technology to provision access to applications so that users could be more efficient

More information

Fulfilling CDM Phase II with Identity Governance and Provisioning

Fulfilling CDM Phase II with Identity Governance and Provisioning SOLUTION BRIEF Fulfilling CDM Phase II with Identity Governance and Provisioning SailPoint has been selected as a trusted vendor by the Continuous Diagnostics and Mitigation (CDM) and Continuous Monitoring

More information

2017 Cost of Data Breach Study

2017 Cost of Data Breach Study 2017 Cost of Data Breach Study United States Benchmark research sponsored by IBM Security Independently conducted by Ponemon Institute LLC June 2017 Ponemon Institute Research Report 2017 Cost of Data

More information

2014 Cost of Data Breach Study: United States

2014 Cost of Data Breach Study: United States 2014 Cost of Data Breach Study: United States Benchmark research sponsored by IBM Independently conducted by Ponemon Institute LLC May 2014 Ponemon Institute Research Report 2014 1 Cost of Data Breach

More information

Benchmarking Privacy: An Executive Summary. International Association of Privacy Professionals

Benchmarking Privacy: An Executive Summary. International Association of Privacy Professionals Benchmarking Privacy: An Executive Summary International Association of Privacy Professionals Inside Front Cover (blank) Benchmarking Privacy: An Executive Summary International Association of Privacy

More information

Simple, Scalable, Real-time Protection

Simple, Scalable, Real-time Protection Data Sheet Simple, Scalable, Real-time Protection Practical Content Security With Egnyte Protect, companies can quickly find and safeguard the content that matters most. It is simple to use, requires almost

More information

2014 Cost of Data Breach Study: Brazil

2014 Cost of Data Breach Study: Brazil 2014 Cost of Data Breach Study: Brazil Benchmark research sponsored by IBM Independently conducted by Ponemon Institute LLC May 2014 Ponemon Institute Research Report 2014 1 Cost of Data Breach Study:

More information

2011 Cost of Data Breach Study: United States

2011 Cost of Data Breach Study: United States 2011 Cost of Data Breach Study: United States Benchmark Research sponsored by Symantec Independently Conducted by Ponemon Institute LLC March 2012 Ponemon Institute Research Report 2011 Cost of Data Breach

More information

Securing Your Business in the Digital Age

Securing Your Business in the Digital Age SAP Solution in Detail SAP GRC Solutions SAP Access Control Securing Your Business in the Digital Age 1 / 13 Table of Contents 3 Quick Facts 4 Governing Access Efficiently in a Hyperconnected World 7 Analyzing

More information

2017 Cost of Data Breach Study

2017 Cost of Data Breach Study 2017 Cost of Data Breach Study Global Overview Benchmark research sponsored by IBM Security Independently conducted by Ponemon Institute LLC June 2017 Ponemon Institute Research Report Part 1. Introduction

More information

Identity is Everything

Identity is Everything Identity is Everything INCREASING CHALLENGES. INCREASING COMPLEXITY. Shadow IT and BYOD Regulatory pressures Hybrid environments spanning cloud, mobile, and on-premises Budget costs and pressures Copyright

More information

SOLUTION BRIEF RSA IDENTITY GOVERNANCE & LIFECYCLE SOLUTION OVERVIEW ACT WITH INSIGHT TO DRIVE INFORMED DECISIONS TO MITIGATE IDENTITY RISK

SOLUTION BRIEF RSA IDENTITY GOVERNANCE & LIFECYCLE SOLUTION OVERVIEW ACT WITH INSIGHT TO DRIVE INFORMED DECISIONS TO MITIGATE IDENTITY RISK RSA IDENTITY GOVERNANCE & LIFECYCLE SOLUTION OVERVIEW ACT WITH INSIGHT TO DRIVE INFORMED DECISIONS TO MITIGATE IDENTITY RISK BENEFITS ACT WITH INSIGHTS Identity has emerged as today s most consequential

More information

Identity & access management solution IDM365 for the Energy & Utility sector

Identity & access management solution IDM365 for the Energy & Utility sector Identity & access management solution IDM365 for the Energy & Utility sector Achieve compliance with regulations such as SOX NERC ISO 27001 An Achilles certified vendor since 2010 1 Challenges in your

More information

Investor Deck. May 2018

Investor Deck. May 2018 Investor Deck May 2018 1 Disclaimer Forward-Looking Statements This presentation contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. All statements

More information

RA Survey Appendix 1. All questions and answers and Additional insights. TM Forum Revenue Assurance Team TM Forum 1 V2015.4

RA Survey Appendix 1. All questions and answers and Additional insights. TM Forum Revenue Assurance Team TM Forum 1 V2015.4 RA Survey Appendix All questions and answers and Additional insights TM Forum Revenue Assurance Team 06 TM Forum All questions and answers 6 7 8 Respondent Profiles Page RA Organizations and Maturity Page

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

Secure Your ERP Environment with Automated Controls Naomi Iseri,Sr. GRC Solution Consultant

Secure Your ERP Environment with Automated Controls Naomi Iseri,Sr. GRC Solution Consultant Secure Your ERP Environment with Automated Controls Naomi Iseri,Sr. GRC Solution Consultant Agenda Introductions & Objectives Why Automate Controls What types of Automation Controls Do I Need When to Implement

More information

Investor Deck. February 2018

Investor Deck. February 2018 Investor Deck February 2018 1 Disclaimer Forward-Looking Statements This presentation contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. All

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

Learn to streamline User Provisioning process in Oracle Applications with workflows

Learn to streamline User Provisioning process in Oracle Applications with workflows Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Copyright. Fulcrum Information Technology, Inc. Learn to streamline User Provisioning process in

More information

Jeff Carpenter Authentication and Access Specialist RSA, The Security Division of EMC. Copyright 2015 EMC Corporation. All rights reserved.

Jeff Carpenter Authentication and Access Specialist RSA, The Security Division of EMC. Copyright 2015 EMC Corporation. All rights reserved. Jeff Carpenter Authentication and Access Specialist RSA, The Security Division of EMC 1 BILLIONS OF USERS MILLIONS OF APPS 2010 HUNDREDS OF MILLIONS OF USERS Mobile Cloud Big Data Social Mobile Devices

More information

Brainwave USER ACCESS REVIEW CERTIFICATION AND RECERTIFICATION IN A NUTSHELL

Brainwave USER ACCESS REVIEW CERTIFICATION AND RECERTIFICATION IN A NUTSHELL Brainwave Identity Analytics USER ACCESS REVIEW CERTIFICATION AND RECERTIFICATION IN A NUTSHELL NEXT-GENERATION IDENTITY ANALYTICS REDUCES THE COST AND BURDEN OF THE USER ACCESS REVIEW PROCESS FOR ACCESS

More information

Sarbanes-Oxley Compliance Kit

Sarbanes-Oxley Compliance Kit Kit February 2018 This product is NOT FOR RESALE or REDISTRIBUTION in any physical or electronic format. The purchaser of this template has acquired the rights to use it for a SINGLE Disaster Recovery

More information

An Oracle White Paper March Access Certification: Addressing and Building On a Critical Security Control

An Oracle White Paper March Access Certification: Addressing and Building On a Critical Security Control An Oracle White Paper March 2010 Access Certification: Addressing and Building On a Critical Security Control Introduction Today s enterprise faces multiple multifaceted business challenges in which the

More information

Sustainable Identity and Access Governance

Sustainable Identity and Access Governance Business White Paper IDENTITY AND SECURITY Sustainable Identity and Access Governance Sustainable Identity and Access Governance Table of Contents: 2..... Enterprise Access Governance: Some Assembly Required

More information

Business Context of ISO conform Internal Financial Control Assessment

Business Context of ISO conform Internal Financial Control Assessment Business Context of ISO 15504 conform Internal Financial Control Assessment By János Ivanyos, Memolux Ltd. (H), IIA Hungary Introduction In this paper the business context of the ISO/IEC 15504 [1] conformant

More information

Create your ideal data quality strategy. Become a more profitable, informed company with better data insight

Create your ideal data quality strategy. Become a more profitable, informed company with better data insight Create your ideal data quality strategy Become a more profitable, informed company with better data insight An Experian Data Quality White Paper March 2015 Introduction...1 The levels of data quality sophistication...2

More information

White Paper. Reducing the Costs of IT Security Management

White Paper. Reducing the Costs of IT Security Management White Paper Reducing the Costs of IT Security Management Sumner Blount, etrust Solutions January 2006 Table of Contents The IT Security Management Challenge... 3 Introduction to Identity and Access Management...

More information

Brochure. Information Management & Government. Archive Data in the Largest Private Cloud. Micro Focus Digital Safe

Brochure. Information Management & Government. Archive Data in the Largest Private Cloud. Micro Focus Digital Safe Brochure Information Management & Government Archive Data in the Largest Private Cloud Micro Focus Digital Safe Brochure Archive Data in the Largest Private Cloud Archive Data in the Largest Private Cloud

More information

Drive Your Business. Four Ways to Improve Your Vendor Risk Program

Drive Your Business. Four Ways to Improve Your Vendor Risk Program Drive Your Business Four Ways to Improve Your Vendor Risk Program Introduction Risk-management professionals often find the creation of a vendor risk management (VRM) program to be a challenging task,

More information

IBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights

IBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights IBM Security Data Sheet IBM QRadar SIEM Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights Use IBM QRadar Security Information and Event Management, powered by the

More information

Role Based Access Governance and HIPAA Compliance: A Pragmatic Approach

Role Based Access Governance and HIPAA Compliance: A Pragmatic Approach WHITE PAPER Role Based Access Governance and HIPAA Compliance: A Pragmatic Approach JULY 2009 Executive Summary The joiner/mover/leaver framework provides a useful mechanism for entitles to use as a basis

More information

2017 Cost of Data Breach Study

2017 Cost of Data Breach Study 2017 Cost of Data Breach Study Australia Benchmark research sponsored by IBM Security Independently conducted by Ponemon Institute LLC June 2017 Ponemon Institute Research Report Part 1. Introduction 2017

More information

Security and Compliance: Taking a Business Perspective. Yolanda Ma, Senior Product Marketing Manager, RSA Professional Strategies S24

Security and Compliance: Taking a Business Perspective. Yolanda Ma, Senior Product Marketing Manager, RSA Professional Strategies S24 Security and Compliance: Taking a Business Perspective Yolanda Ma, Senior Product Marketing Manager, RSA Professional Strategies S24 Agenda The Great Transformation Taking a Business Perspective In Theory,

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T H ow T o d a y' s I T C h a l lenges Ar e C r e a t i n g N ew R e q u i r e m e n ts in Support Servi c e s D elive r y May 2012 Adapted from Converging Infrastructure

More information

ITIL Saves Money in Troubled Times

ITIL Saves Money in Troubled Times ITIL Saves Money in Troubled Times George Spalding Executive Vice President Pink Elephant Pink Elephant Leading The Way In IT Management Best Practices The Winds Of Change New Challenges For IT New Choices

More information

Certified Identity Governance Expert (CIGE) Overview & Curriculum

Certified Identity Governance Expert (CIGE) Overview & Curriculum Overview Identity and Access Governance (IAG) provides the link between Identity and Access Management (IAM) rules and the policies within a company to protect systems and data from unauthorized access,

More information

Identity & access management solution IDM365 for the Public Sector

Identity & access management solution IDM365 for the Public Sector Identity & access management solution IDM365 for the Public Sector Achieve compliance with regulations such as ISO 27001 Data Protection and Privacy CoCo 1 Challenges in your sector Public sector organizations

More information

Compliance Management Solutions from Novell Insert Presenter's Name (16pt)

Compliance Management Solutions from Novell Insert Presenter's Name (16pt) Compliance Solutions from Novell Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Issues Driving the Compliance Need Dealing with Compliance Requirements It's All about Balance Flexibility

More information

Security intelligence for service providers

Security intelligence for service providers Security Thought Leadership White Paper July 2015 Security intelligence for service providers Expanded capabilities for IBM Security QRadar including multi-tenancy, unified management and SaaS 2 Security

More information

https://www.e-janco.com

https://www.e-janco.com E-mail: support@e-janco.com https://www.e-janco.com Summary Table of Contents IT INFRASTRUCTURE, STRATEGY, AND CHARTER SUMMARY...1 Benefits of IT Infrastructure Management...1 Base Assumptions and Objectives...2

More information

Selecting the Right Identity Governance Solution A BUYER S GUIDE

Selecting the Right Identity Governance Solution A BUYER S GUIDE Selecting the Right Identity Governance Solution A BUYER S GUIDE SECOND EDITION CONTENTS Selecting the Right Identity Governance Solution A BUYER S GUIDE Smooth Sailing Ahead About this Guide Go the Distance

More information

Benchmarking Report Share, Compare, Validate SAMPLE. Year: 2017 Your Organization Date

Benchmarking Report Share, Compare, Validate SAMPLE. Year: 2017 Your Organization Date Benchmarking Report Share, Compare, Validate Year: 2017 Your Organization Date Benchmarking Tier 1: Your Organization Benchmarking Tier 2: Services Benchmarking Tier 3: Services $1B to $5B Benchmarking

More information

Streamline Physical Identity and Access Management

Streamline Physical Identity and Access Management Streamline Physical Identity and Access Management Quantum Secure s SAFE Software Suite automates key processes and empowers IT teams to implement, streamline and manage physical access Table of Contents

More information

Acquiring Cloud Services A Contracting Officer s perspective

Acquiring Cloud Services A Contracting Officer s perspective Acquiring Cloud Services A Contracting Officer s perspective Scott M. Stewart Technical Director 16 May 2018 Agenda Service and deployment models and why they matter Security, data characterizations, and

More information

Security Monitoring Service Description

Security Monitoring Service Description Security Monitoring Service Description Contents Section 1: UnderdefenseSOC Security Monitoring Service Overview 3 Section 2: Key Components of the Service 4 Section 3: Onboarding Process 5 Section 4:

More information

Information Economics

Information Economics Information Economics Improve information economics, cut costs and reduce risks 2014 IBM Corporation Enterprise big data dilemma Data capacity on average in enterprises is growing at 40 percent to 60 percent

More information

Mobile Payments & Online Shopping Survey of U.S. Consumers

Mobile Payments & Online Shopping Survey of U.S. Consumers Mobile Payments & Online Shopping Survey of U.S. Consumers Sponsored by ThreatMetrix Independently conducted by Ponemon Institute LLC Publication Date: October 2011 Ponemon Institute Research Report Part

More information

Recommendation: Directory Services Architecture and Future IAM Governance Model

Recommendation: Directory Services Architecture and Future IAM Governance Model Recommendation: Directory Services Architecture and Future IAM Governance Model I. EXECUTIVE SUMMARY Identity and access management (IAM) is a broad administrative function that identifies individuals

More information

SAM + SAP HOW DOES THE SQUARE PEG FIT IN THE ROUND HOLE?

SAM + SAP HOW DOES THE SQUARE PEG FIT IN THE ROUND HOLE? SAM + SAP HOW DOES THE SQUARE PEG FIT IN THE ROUND HOLE? SAP LICENSING AND THE SAM LIFECYCLE The challenges of SAM, ISO 19770 and SAP License Management. 1 in a 4-part Series SAP LICENSING AND THE SAM

More information

Presentation for INCC LUMS 2008 May 2, 2008 Presented by Shahed Latif, KPMG LLP, Silicon Valley

Presentation for INCC LUMS 2008 May 2, 2008 Presented by Shahed Latif, KPMG LLP, Silicon Valley MAINTAINING A SECURE GLOBAL ENTERPRISE : Challenges and Emerging Solutions Presentation for INCC LUMS 2008 May 2, 2008 Presented by Shahed Latif, KPMG LLP, Silicon Valley The 2008 Chief Information Security

More information

Managing Privileged Access Security In A Hybrid IT World The Case For Privileged Identity Management As-A-Service

Managing Privileged Access Security In A Hybrid IT World The Case For Privileged Identity Management As-A-Service A Forrester Consulting Thought Leadership Paper Commissioned By Centrify April 2016 Managing Privileged Access Security In A Hybrid IT World The Case For Privileged Identity Management As-A-Service Table

More information

Review of Duke Energy Florida, LLC Internal Audit Function

Review of Duke Energy Florida, LLC Internal Audit Function Review of Duke Energy Florida, LLC Internal Audit Function MAY 2017 B Y A U T H O R I T Y O F The Florida Public Service Commission Office of Auditing and Performance Analysis Review of Duke Energy Florida,

More information

Cloud for the Modern Workplace. How Insight and Microsoft Azure helps companies accelerate, spend less and do more

Cloud for the Modern Workplace. How Insight and Microsoft Azure helps companies accelerate, spend less and do more Cloud for the Modern Workplace How Insight and Microsoft Azure helps companies accelerate, spend less and do more Introduction Microsoft Azure enhances modern business through a variety of integrated services

More information

CENTRE (Common Enterprise Resource)

CENTRE (Common Enterprise Resource) CENTRE (Common Enterprise Resource) IT Service Management Software designed for ISO 20000 ITSM ISO/IEC 20000 is the international IT Service Management (ITSM) standard that enables IT organizations (whether

More information

Cloud monitoring services An opportunity emerges for service providers

Cloud monitoring services An opportunity emerges for service providers BLACK & WHITE PAPER Cloud monitoring services An opportunity emerges for service providers JUNE 2017 COMMISSIONED BY COPYRIGHT 2017 451 RESEARCH. ALL RIGHTS RESERVED. About this paper A Black & White paper

More information

Identity and Access Management

Identity and Access Management Chapter 2 Identity and Access Management There are many configurations of identity and access management (IAM) systems, and to some extent, each organization s IAM system will be unique, developed and

More information

Managing FTI Data Compliance. Addressing Publication 1075

Managing FTI Data Compliance. Addressing Publication 1075 Managing FTI Data Compliance Addressing Publication 1075 Introduction Daniel Gabriel, Manager, Security & Privacy Deloitte & Touche LLP Daniel has over nine years of experience providing ERP security and

More information

Business Analytics. enherent. Leveraging Analytic Applications. May Connecting the Dots.

Business Analytics. enherent. Leveraging Analytic Applications. May Connecting the Dots. Connecting the Dots Business Analytics Leveraging Analytic Applications May 2010 2010 Corp. All rights reserved. www..com Data Explosion There is no bigger problem facing individuals and organizations

More information

KEY CHALLENGES TO INSURANCE RISK MODELLING: A SURVEY OF UK GENERAL INSURANCE ACTUARIES AND RISK MANAGERS

KEY CHALLENGES TO INSURANCE RISK MODELLING: A SURVEY OF UK GENERAL INSURANCE ACTUARIES AND RISK MANAGERS INSIGHT REPORT RISK MANAGEMENT KEY CHALLENGES TO INSURANCE RISK MODELLING: A SURVEY OF UK GENERAL INSURANCE ACTUARIES AND RISK MANAGERS IN ASSOCIATION WITH GRANT THORNTON 1 Key Challenges to Insurance

More information

Operational and Financial

Operational and Financial Operational and Financial [Report] The CIO in 2017 Highlighting Operational and Financial Barriers to Cloud The report, independently conducted with 200 UK CIOs, looks at the operational and financial

More information

The World Quality Report How does your organization compare against today s trends in software quality and testing?

The World Quality Report How does your organization compare against today s trends in software quality and testing? The -2011 How does your organization compare against today s trends in software quality and testing? Speaker Mattias Bergströmner - Global Service Line Testing - Subject Matter Expert Testing - Strategic

More information

IBM Emptoris Rivermine Telecom Expense Management solutions

IBM Emptoris Rivermine Telecom Expense Management solutions Industry Solutions IBM Emptoris Rivermine Telecom Expense Management solutions Addressing the telecommunications expense challenge Highlights With a global solution that addresses the entire telecommunications

More information

Business Benefits by Aligning IT best practices

Business Benefits by Aligning IT best practices Business Benefits by Aligning IT best practices Executive Summary Since the Sarbanes-Oxley Act (Sarbanes-Oxley or SOX) was signed into law in 2002, many companies have adopted some IT practices to comply

More information

BIGFIX. Maintaining Continuous Compliance with BigFix. Executive Summary

BIGFIX. Maintaining Continuous Compliance with BigFix. Executive Summary Maintaining Continuous Compliance with BigFix Executive Summary Meeting regulatory and internal compliance guidelines is a de facto standard practice for IT operations and IT security teams in public and

More information

Comprehensive Cost and Security Management for C2S Environments

Comprehensive Cost and Security Management for C2S Environments SOLUTION BRIEF Comprehensive Cost and Security Management for C2S Environments Security Highlights CloudTrail Integration Leverage the strength of CloudTrail reporting. CloudCheckr parses the logs for

More information

Driving Business Performance

Driving Business Performance Workforce Scheduling Driving Business Performance How Workforce Scheduling Optimization Aligns the Workforce with Business Demands for Customer Satisfaction and Success While many factors affect an organization

More information

Simplify and Secure: Managing User Identities Throughout their Lifecycles

Simplify and Secure: Managing User Identities Throughout their Lifecycles PRODUCT FAMILY BRIEF: CA SOLUTIONS FOR IDENTITY LIFECYCLE MANAGEMENT Simplify and Secure: Managing User Identities Throughout their Lifecycles CA Identity & Access Management (IAM) Identity Lifecycle Management

More information

YOUR BEST ITSM BUDGET EVER. How to be absolutely sure you 've thought of everything for 2016.

YOUR BEST ITSM BUDGET EVER. How to be absolutely sure you 've thought of everything for 2016. YOUR BEST ITSM BUDGET EVER How to be absolutely sure you 've thought of everything for 2016. " End user support makes up 95% of the perception of IT across an organization. But, the typical IT department

More information

Why You Should Take a Holistic Approach

Why You Should Take a Holistic Approach Why You Should Take a Holistic Approach to ITIL and Service Support best practices WHITE PAPER Table of Contents Executive Summary...1 Moving to a Holistic Service Support Approach...2 Optimize and Integrate

More information

How to Choose a Managed Services Provider

How to Choose a Managed Services Provider How to Choose a Managed Services Provider Finding Peace of Mind If you re outsourcing your IT services, you need to find a Managed Services Provider you can trust. A technology partner with the experience,

More information

Meridian Server TRANSFORM ENGINEERING DATA INTO ACTIONABLE ASSET INFORMATION

Meridian Server TRANSFORM ENGINEERING DATA INTO ACTIONABLE ASSET INFORMATION TRANSFORM ENGINEERING DATA INTO ACTIONABLE ASSET INFORMATION For several organizations, there are significant staggering consequences for poor engineering information management. A loss caused by information

More information

SailPoint + Microsoft: Better Together

SailPoint + Microsoft: Better Together SOLUTION BRIEF SailPoint + Microsoft: Better Together Today s rapidly changing business environment demands that businesses be agile, innovative and secure. Organizations can now join the identity governance

More information

Compliance and the benefits of investing in information technology. An Economist Intelligence Unit executive summary sponsored by Oracle.

Compliance and the benefits of investing in information technology. An Economist Intelligence Unit executive summary sponsored by Oracle. An Economist Intelligence Unit executive summary sponsored by Oracle Compliance and the Context CEOs around the world have become increasingly concerned about the growing regulatory burden on their businesses.

More information

A 6-step approach for ITSM and ITOM to work better together Steps 1 and 2

A 6-step approach for ITSM and ITOM to work better together Steps 1 and 2 A 6-step approach for ITSM and ITOM to work better together Steps 1 and 2 START 1 Introduction Many corporate IT organizations are currently trapped between the proverbial rock and a hard place. On the

More information

ICT budget and staffing trends in Germany

ICT budget and staffing trends in Germany ICT budget and staffing trends in Germany Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... Error! Bookmark not 1.1 Introduction... Error! Bookmark not 1.2

More information

Application: All licensed institutions and supervisory personnel

Application: All licensed institutions and supervisory personnel Title: SR-1 Strategic Risk Management Date: FINAL Purpose: To set out the approach which the NBRM will adopt in the supervision of licensed institutions strategic risk, and to provide guidance to licensed

More information

SOLUTION BRIEF IDENTITY AND ACCESS GOVERNANCE. Simplify Identity Governance and Reduce Risk With the CA Identity Suite

SOLUTION BRIEF IDENTITY AND ACCESS GOVERNANCE. Simplify Identity Governance and Reduce Risk With the CA Identity Suite SOLUTION BRIEF IDENTITY AND ACCESS GOVERNANCE Simplify Identity Governance and Reduce Risk With the CA Identity Suite 2 SOLUTION BRIEF: IDENTITY AND ACCESS GOVERNANCE Section 1: Challenge Identity Governance

More information

WHITE PAPER. Annual IIoT Maturity Survey. Adoption of IIoT in Manufacturing, Oil and Gas, and Transportation

WHITE PAPER. Annual IIoT Maturity Survey. Adoption of IIoT in Manufacturing, Oil and Gas, and Transportation WHITE PAPER 2017 Adoption of IIoT in Manufacturing, Oil and Gas, and Transportation 1 Executive Summary A survey of senior-level, experienced Industrial Internet of Things (IIoT) decision-makers and influencers

More information

Leverage T echnology: Turn Risk into Opportunity

Leverage T echnology: Turn Risk into Opportunity Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Copyright. Fulcrum Information Technology, Inc. Enhance security, improve helpdesk productivity,

More information

Employee Lifecycle Management in an R12 World

Employee Lifecycle Management in an R12 World Employee Lifecycle Management in an R12 World May 21, 2009 Emrah Alpa, CISSP Services Architect April, 2009 Agenda > CA IAM Portfolio Overview > Employee Lifecycle Management Live Demo User On-Boarding

More information

Identity and Access Management. Program Primer

Identity and Access Management. Program Primer Identity and Access Program Primer Executive Summary The role of identity in the modern enterprise has been steadily growing in importance over the last decade. As the enterprise technology stack continues

More information

Executive Licensing Series Are your Microsoft True Up negotiations leaving money on the table?

Executive Licensing Series Are your Microsoft True Up negotiations leaving money on the table? Executive Licensing Series Are your Microsoft True Up negotiations leaving money on the table? Explore Plan Execute Support This document is the Explore report for the Licensing Toolkit. For more in depth

More information

SaaS vs. On-premise. The Ecommerce Platforming Showdown

SaaS vs. On-premise. The Ecommerce Platforming Showdown SaaS vs. On-premise The Ecommerce Platforming Showdown Table of Contents 3 4 6 8 10 12 14 15 18 Introduction Overview Round 1 Total Cost of Ownership Round 2 Business System Integration Round 3 Customization

More information

The General Data Protection Regulation (GDPR): Getting in good shape for the deadline Copenhagen, 19 September 2017 Janus Friis Bindslev Partner,

The General Data Protection Regulation (GDPR): Getting in good shape for the deadline Copenhagen, 19 September 2017 Janus Friis Bindslev Partner, The General Data Protection Regulation (GDPR): Getting in good shape for the deadline Copenhagen, 19 September 2017 Janus Friis Bindslev Partner, Deloitte, Cyber Advisory Table of Contents Introduction

More information

Susan Schmidt Bies: Corporate governance and community banks

Susan Schmidt Bies: Corporate governance and community banks Susan Schmidt Bies: Corporate governance and community banks Remarks by Ms Susan Schmidt Bies, Member of the Board of Governors of the US Federal Reserve System, before the Annual Convention of the Arkansas

More information

Unleash the Power of Mainframe Data in the Application Economy

Unleash the Power of Mainframe Data in the Application Economy Unleash the Power of Mainframe Data in the Application Economy Data Drives the Application Economy Data is the most valuable asset a business has, and the most important data lives on the mainframe. This

More information

Rapidly Reduce Segregation of Duty Violations in Oracle EBS R12 Responsibilities Session ID#: 15042

Rapidly Reduce Segregation of Duty Violations in Oracle EBS R12 Responsibilities Session ID#: 15042 Rapidly Reduce Segregation of Duty Violations in Oracle EBS R12 Responsibilities Session ID#: 15042 Responsibility templates from a catalog of pre-configured ERP roles. Workflow to update, review as well

More information

EU Directive: disclosure of non-financial information and diversity information

EU Directive: disclosure of non-financial information and diversity information EU Directive: disclosure of non-financial information and diversity information EU Directive on disclosure of non-financial information and diversity information From reporting year 2017, the legal requirements

More information