SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Cloud, Cost & Complexity:
Challenging the Traditional
Identity Model
New Survey of Enterprise IT Decision Makers Shows An
Increasingly Complex Mix of Application Users and Top Challenges
with Identity & Access Management
Symplified Identity Management Research: Key
Findings
In the era of the extended enterprise, fewer boundaries exist thanks
to continuous innovations in cloud and mobile technologies; business
applications are now on premises, cloud – and SaaSbased; and users
extend beyond onsite employees to include conractors, customers
and partners..
Many large organizations are grappling with how to address these
new challenges in identity and access management (IAM) with the
legacy solutions they already have in place.
Because no single traditional IAM product met all of their needs,
many enterprises have created, and now must manage, a patchwork
of multiple solutions. Mobile identities and the growing number of
new applications are common challenges.
Symplified Identity Management Research: Key
Findings

50% of enterprises
manage identities for
at least one type of
external user; 75%
manage mobile
identities.
Symplified Identity Management Research: Key
Findings

Security and total cost
of ownership are top
concerns.
Symplified Identity Management Research: Key
Findings

Using multiple tools to
manage identities and
managing mobile
identities are top
challenges.
Symplified Identity Management Research: Key
Findings

Regulatory compliance
is among the top 3 IAM
goals for enterprises.
About The Research
Research methodology: Symplified commissioned a survey
conducted October 12-13, 2013 among 63 IT decision makers
at companies with 3,000 or more employees. Participants
completed an online survey designed by Lawless Research LLC
and programmed via Qualtrics, Inc. The margin of error is +/12 percentage points at the 95 percent level of confidence.
About Symplified
Symplified was founded on the principle that identity is central
to enterprise security. Today the company delivers an identity
management services platform that manages user identities
and access across any device or application, located on
premises or in the cloud, anywhere in the world. Symplified is
headquartered in Boulder, Colorado. Learn more at
www.symplified.com.

Weitere ähnliche Inhalte

Andere mochten auch

Technology the solar system
Technology the solar systemTechnology the solar system
Technology the solar systemMingo Peiro
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 
Transferencia De Calor Por Conducción Bidireccional
Transferencia De Calor Por Conducción BidireccionalTransferencia De Calor Por Conducción Bidireccional
Transferencia De Calor Por Conducción BidireccionalMar Vz
 
Literatura gauchesca
Literatura gauchescaLiteratura gauchesca
Literatura gauchescaRoxana Blanco
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 

Andere mochten auch (6)

Technology the solar system
Technology the solar systemTechnology the solar system
Technology the solar system
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
Transferencia De Calor Por Conducción Bidireccional
Transferencia De Calor Por Conducción BidireccionalTransferencia De Calor Por Conducción Bidireccional
Transferencia De Calor Por Conducción Bidireccional
 
Literatura gauchesca
Literatura gauchescaLiteratura gauchesca
Literatura gauchesca
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Ipr basics+licensing frown_07_12_13_pdf
Ipr basics+licensing frown_07_12_13_pdfIpr basics+licensing frown_07_12_13_pdf
Ipr basics+licensing frown_07_12_13_pdf
 

Mehr von Symplified

New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITSymplified
 
Infographic: Mobile Identity Management Trends in the Enterprise
Infographic: Mobile Identity Management Trends in the EnterpriseInfographic: Mobile Identity Management Trends in the Enterprise
Infographic: Mobile Identity Management Trends in the EnterpriseSymplified
 
New Research on Security Risks and Blind Spots in Current Identity Management...
New Research on Security Risks and Blind Spots in Current Identity Management...New Research on Security Risks and Blind Spots in Current Identity Management...
New Research on Security Risks and Blind Spots in Current Identity Management...Symplified
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheetSymplified
 
DemandTec case study
DemandTec case studyDemandTec case study
DemandTec case studySymplified
 
Biogen Idec case study
Biogen Idec case studyBiogen Idec case study
Biogen Idec case studySymplified
 
Merit Medical case study
Merit Medical case study Merit Medical case study
Merit Medical case study Symplified
 

Mehr von Symplified (7)

New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
 
Infographic: Mobile Identity Management Trends in the Enterprise
Infographic: Mobile Identity Management Trends in the EnterpriseInfographic: Mobile Identity Management Trends in the Enterprise
Infographic: Mobile Identity Management Trends in the Enterprise
 
New Research on Security Risks and Blind Spots in Current Identity Management...
New Research on Security Risks and Blind Spots in Current Identity Management...New Research on Security Risks and Blind Spots in Current Identity Management...
New Research on Security Risks and Blind Spots in Current Identity Management...
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheet
 
DemandTec case study
DemandTec case studyDemandTec case study
DemandTec case study
 
Biogen Idec case study
Biogen Idec case studyBiogen Idec case study
Biogen Idec case study
 
Merit Medical case study
Merit Medical case study Merit Medical case study
Merit Medical case study
 

Kürzlich hochgeladen

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Kürzlich hochgeladen (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

New Research on Identity Management Trends December 2013

  • 1. Cloud, Cost & Complexity: Challenging the Traditional Identity Model New Survey of Enterprise IT Decision Makers Shows An Increasingly Complex Mix of Application Users and Top Challenges with Identity & Access Management
  • 2. Symplified Identity Management Research: Key Findings In the era of the extended enterprise, fewer boundaries exist thanks to continuous innovations in cloud and mobile technologies; business applications are now on premises, cloud – and SaaSbased; and users extend beyond onsite employees to include conractors, customers and partners.. Many large organizations are grappling with how to address these new challenges in identity and access management (IAM) with the legacy solutions they already have in place. Because no single traditional IAM product met all of their needs, many enterprises have created, and now must manage, a patchwork of multiple solutions. Mobile identities and the growing number of new applications are common challenges.
  • 3. Symplified Identity Management Research: Key Findings 50% of enterprises manage identities for at least one type of external user; 75% manage mobile identities.
  • 4. Symplified Identity Management Research: Key Findings Security and total cost of ownership are top concerns.
  • 5. Symplified Identity Management Research: Key Findings Using multiple tools to manage identities and managing mobile identities are top challenges.
  • 6. Symplified Identity Management Research: Key Findings Regulatory compliance is among the top 3 IAM goals for enterprises.
  • 7. About The Research Research methodology: Symplified commissioned a survey conducted October 12-13, 2013 among 63 IT decision makers at companies with 3,000 or more employees. Participants completed an online survey designed by Lawless Research LLC and programmed via Qualtrics, Inc. The margin of error is +/12 percentage points at the 95 percent level of confidence.
  • 8. About Symplified Symplified was founded on the principle that identity is central to enterprise security. Today the company delivers an identity management services platform that manages user identities and access across any device or application, located on premises or in the cloud, anywhere in the world. Symplified is headquartered in Boulder, Colorado. Learn more at www.symplified.com.

Hinweis der Redaktion

  1. over a third (38 percent) reported experiencing accidental access by an unauthorized user; and nearly a quarter (24 percent) have experienced a hack exposing user credentials.
  2. over a third (38 percent) reported experiencing accidental access by an unauthorized user; and nearly a quarter (24 percent) have experienced a hack exposing user credentials.
  3. over a third (38 percent) reported experiencing accidental access by an unauthorized user; and nearly a quarter (24 percent) have experienced a hack exposing user credentials.