SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Steve Brasen
Research Director – Endpoint and Identity Management
Enterprise Management Associates
Achieving Effective Identity and
Access Governance
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Watch the On-Demand Webinar
Slide 2
• Achieving Effective Identity and Access Governance On-
Demand webinar is available here:
http://info.enterprisemanagement.com/achieving-effective-identity-
and-access-governance-webinar-ws
• Check out upcoming webinars from EMA here:
http://www.enterprisemanagement.com/freeResearch
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Featured Speaker
Steve Brasen, Research Director, EMA
Steve's career at EMA follows 20+ years of “in the trenches”
experience in IT systems support, engineering, and management for
high technology, telecommunications, and financial
institutions. Steve's primary focus area at EMA is on endpoint
management topics, including enterprise mobile management, client
lifecycle management, desktop virtualization, and workspace
management.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Logistics
Slide 4 © 2019 Enterprise Management Associates, Inc.
An archived version of the event recording will be available at
www.enterprisemanagement.com
• Log questions in the chat panel located on the lower left-
hand corner of your screen
• Questions will be addressed during the Q&A session of
the event
QUESTIONS
EVENT RECORDING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Steve Brasen
Research Director – Endpoint and Identity Management
Enterprise Management Associates
Achieving Effective Identity and
Access Governance
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Sponsored by:
Slide 6 © 2019 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Agenda
Slide 7 © 2019 Enterprise Management Associates, Inc.
• Understanding Identity and Access
Governance
• Research and Methodology
• Business Requirements and
Challenges for Identity and Access
Governance
• Effective Governance Policies,
Processes, and Audits
• Achieving Business Goals for Identity
and Access Governance
• Conclusions
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Understanding Identity and Access Governance
The first line of defense in enterprise security
is identity and access management (IAM)
• Identity management positively determines
who is requesting access
• Access management controls the resources
identified that users have access to and the
ways in which they can use them
Slide 8 © 2019 Enterprise Management Associates, Inc.
Identity and access governance processes
orchestrate the policy-based controls that enable
organizations to meet enterprise IT security and
compliance initiatives.
• Defines the policies enforced by IAM controls
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Understanding Identity and Access Governance
Key elements of identity and
access governance include:
 Policy Development
 Policy Enforcement
 Policy Review
 Auditing
 User and Group Administration
 Identity Intelligence
 Privileged Access Management
Slide 9 © 2019 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Research and Methodology
EMA conducted primary, survey-based research to identify optimal
approaches to identity and access governance
Slide 10 © 2019 Enterprise Management Associates, Inc.
Survey Demographics
• 206 respondents
• All respondents were from North America
• Respondents were IT and security
managers knowledgeable about their
organization’s identity and access
management requirements and solutions
• Respondents were from a wide range of
industry verticals and horizontals
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Business Requirements and Challenges
Identity and access governance
is considered an essential
practice by the majority of
businesses
Slide 11 © 2019 Enterprise Management Associates, Inc.
Percentage of respondents indicating how important identity
and access governance is to their organization
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Business Requirements and Challenges
While most organizations deliver IT services directly to their
employees, many also extend access to users outside their business
Slide 12 © 2019 Enterprise Management Associates, Inc.
Percentage of respondents indicating the types of users who access enterprise IT resources
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Business Requirements and Challenges
Governance practices are also encumbered by the diversity of
resources accessed by supported users
Slide 13 © 2019 Enterprise Management Associates, Inc.
Percentage of respondents indicating types of hosted IT resources that require
identity and access controls governed by their organization
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Business Requirements and Challenges
85% of survey respondents indicated that users in their organization
violated business IAM policies in the preceding 12 months
Slide 14 © 2019 Enterprise Management Associates, Inc.
Percentage of respondents indicating consequences that occurred due to a violation of their
organization’s identity and access management policies
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Governance Policies, Processes, and Audits
The practices managed by a governance board can vary greatly
depending on the type of business and required level of security.
Slide 15 © 2019 Enterprise Management Associates, Inc.
Percentage of respondents indicating processes that are actively overseen by a governance body in their organization
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Governance Policies, Processes, and Audits
There is a direct correlation between the frequency of audits
and an organization’s ability to detect policy violations.
Slide 16 © 2019 Enterprise Management Associates, Inc.
Percentage of users in respondent’s organization who were detected violating identity and access policies in the last year
(segmented by the average frequency of audits)
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Governance Policies, Processes, and Audits
The effort necessary to perform frequent governance audits is
directly attributable to the number and complexity of audit tasks.
Slide 17 © 2019 Enterprise Management Associates, Inc.
Percentage of respondents indicating the processes included in formal identity and access governance audits
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Achieving Business Goals for Governance
Identity and access governance platforms provide a wide range
of features for automating and managing processes across the
breadth of governance requirements.
Slide 18 © 2019 Enterprise Management Associates, Inc.
Percentage of respondents indicating the most important features of an identity and access governance platform
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Achieving Business Goals for Governance
The value achieved from adopting an identity and access
governance platform is quantified by reviewing the level of
difficulty in performing specific tasks
Slide 19 © 2019 Enterprise Management Associates, Inc.
Comparing platform adopters to non-adopters on the LEVEL OF DIFFICULTY in performing identity and access governance tasks
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Achieving Business Goals for Governance
Difficult tasks are not necessarily time-consuming (and vice versa),
but the amount of time spent performing tasks is also affected by the
adoption of a governance platform
Slide 20 © 2019 Enterprise Management Associates, Inc.
Comparing platform adopters to non-adopters on HOW TIME-CONSUMING it is to perform identity and access governance tasks
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Achieving Business Goals for Governance
The financial cost of performing governance tasks was also
determined to be broadly mitigated by the adoption of
governance platforms
Slide 21 © 2019 Enterprise Management Associates, Inc.
Comparing platform adopters to non-adopters on HOW FINANCIALLY COSTLY it is to perform identity and access governance tasks
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Conclusions
 Effective identity and access governance
requires the establishment of holistic visibility
across their entire IT ecosystem
 Audit and reporting processes must be
performed at least once every month to close
potential risks and ensure existing policies
accurately reflect business requirements
 An automated identity and access governance
platform is essential to easily and cost-
effectively achieving continuous compliance
and risk mitigation
Slide 22 © 2019 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Questions?
Slide 23 © 2019 Enterprise Management Associates, Inc.
Get the full report at http://bit.ly/2WFvFKc

Weitere ähnliche Inhalte

Was ist angesagt?

AIIM_White_Paper_AP-AR_2014
AIIM_White_Paper_AP-AR_2014AIIM_White_Paper_AP-AR_2014
AIIM_White_Paper_AP-AR_2014
Patrick BOURLARD
 
What the heck is a Fractional CIO and why would I want one
What the heck is a Fractional CIO and why would I want oneWhat the heck is a Fractional CIO and why would I want one
What the heck is a Fractional CIO and why would I want one
Craig Bickel
 
biz journal productivity apps
biz journal productivity appsbiz journal productivity apps
biz journal productivity apps
Carolyn Schuk
 
The_Forrester_Wave_Enterp
The_Forrester_Wave_EnterpThe_Forrester_Wave_Enterp
The_Forrester_Wave_Enterp
Yann Hermouet
 

Was ist angesagt? (20)

Assess and Optimize BI Operations - IT
Assess and Optimize BI Operations - ITAssess and Optimize BI Operations - IT
Assess and Optimize BI Operations - IT
 
Top Internal Audit Priorities for Financial Services Organizations, 2016
Top Internal Audit Priorities for Financial Services Organizations, 2016Top Internal Audit Priorities for Financial Services Organizations, 2016
Top Internal Audit Priorities for Financial Services Organizations, 2016
 
Core Transformation: How Pekin Insurance Modernized Its Systems on AWS - FSI2...
Core Transformation: How Pekin Insurance Modernized Its Systems on AWS - FSI2...Core Transformation: How Pekin Insurance Modernized Its Systems on AWS - FSI2...
Core Transformation: How Pekin Insurance Modernized Its Systems on AWS - FSI2...
 
IT Strategic Planning (Case Studies)
IT Strategic Planning (Case Studies)IT Strategic Planning (Case Studies)
IT Strategic Planning (Case Studies)
 
Innovation – Success or Catastrophe?
Innovation – Success or Catastrophe?Innovation – Success or Catastrophe?
Innovation – Success or Catastrophe?
 
AIIM_White_Paper_AP-AR_2014
AIIM_White_Paper_AP-AR_2014AIIM_White_Paper_AP-AR_2014
AIIM_White_Paper_AP-AR_2014
 
What the heck is a Fractional CIO and why would I want one
What the heck is a Fractional CIO and why would I want oneWhat the heck is a Fractional CIO and why would I want one
What the heck is a Fractional CIO and why would I want one
 
Artificial Intelligence in Financial Services: From Nice to Have to Must Have
Artificial Intelligence in Financial Services: From Nice to Have to Must HaveArtificial Intelligence in Financial Services: From Nice to Have to Must Have
Artificial Intelligence in Financial Services: From Nice to Have to Must Have
 
5 AI-Powered ITSM Myths Debunked
5 AI-Powered ITSM Myths Debunked5 AI-Powered ITSM Myths Debunked
5 AI-Powered ITSM Myths Debunked
 
biz journal productivity apps
biz journal productivity appsbiz journal productivity apps
biz journal productivity apps
 
CompTIA Second Annual Trends in Enterprise Mobility: BYOD Uncovered
CompTIA Second Annual Trends in Enterprise Mobility: BYOD UncoveredCompTIA Second Annual Trends in Enterprise Mobility: BYOD Uncovered
CompTIA Second Annual Trends in Enterprise Mobility: BYOD Uncovered
 
Planning for success using enterprise architecture in institution planning v1
Planning for success  using enterprise architecture in institution planning v1Planning for success  using enterprise architecture in institution planning v1
Planning for success using enterprise architecture in institution planning v1
 
Saving Money Through EDI Integration
Saving Money Through EDI IntegrationSaving Money Through EDI Integration
Saving Money Through EDI Integration
 
How to improve processes - what you need to know in 2 min
How to improve processes - what you need to know in 2 minHow to improve processes - what you need to know in 2 min
How to improve processes - what you need to know in 2 min
 
The_Forrester_Wave_Enterp
The_Forrester_Wave_EnterpThe_Forrester_Wave_Enterp
The_Forrester_Wave_Enterp
 
How AI is Making Contract Management Easier and More Effective
How AI is Making Contract Management Easier and More EffectiveHow AI is Making Contract Management Easier and More Effective
How AI is Making Contract Management Easier and More Effective
 
Zhameir
ZhameirZhameir
Zhameir
 
How Agile Application Portfolio Rationalization Delivers Digital Success
How Agile Application Portfolio Rationalization Delivers Digital SuccessHow Agile Application Portfolio Rationalization Delivers Digital Success
How Agile Application Portfolio Rationalization Delivers Digital Success
 
Catching the Tide: VMware IT as a Service
Catching the Tide: VMware IT as a ServiceCatching the Tide: VMware IT as a Service
Catching the Tide: VMware IT as a Service
 
Empowering Workload Automation with Intelligence
Empowering Workload Automation with IntelligenceEmpowering Workload Automation with Intelligence
Empowering Workload Automation with Intelligence
 

Ähnlich wie Achieving Effective Identity and Access Governance

ITS 833 – INFORMATION GOVERNANCEChapter 2 – Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 2 – Information Go.docxITS 833 – INFORMATION GOVERNANCEChapter 2 – Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 2 – Information Go.docx
vrickens
 

Ähnlich wie Achieving Effective Identity and Access Governance (20)

Passwordless Authentication
Passwordless AuthenticationPasswordless Authentication
Passwordless Authentication
 
Modern Requirements and Solutions for Privileged Access Management (PAM)
Modern Requirements and Solutions for Privileged Access Management (PAM)Modern Requirements and Solutions for Privileged Access Management (PAM)
Modern Requirements and Solutions for Privileged Access Management (PAM)
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
 
Responsible User Empowerment: Enabling Privileged Access Management
Responsible User Empowerment: Enabling Privileged Access ManagementResponsible User Empowerment: Enabling Privileged Access Management
Responsible User Empowerment: Enabling Privileged Access Management
 
Automation, AI, and Analytics: Reinventing ITSM
Automation, AI, and Analytics: Reinventing ITSMAutomation, AI, and Analytics: Reinventing ITSM
Automation, AI, and Analytics: Reinventing ITSM
 
The Great Scheduler Migration
The Great Scheduler MigrationThe Great Scheduler Migration
The Great Scheduler Migration
 
Modernization and the Operation of Hybrid Data Ecosystems
Modernization and the Operation of Hybrid Data EcosystemsModernization and the Operation of Hybrid Data Ecosystems
Modernization and the Operation of Hybrid Data Ecosystems
 
IT Service Modeling in the Age of Cloud and Containers
IT Service Modeling in the Age of Cloud and ContainersIT Service Modeling in the Age of Cloud and Containers
IT Service Modeling in the Age of Cloud and Containers
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...
Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cos...
 
Event-driven Business: How Leading Companies are Adopting Streaming Strategies
Event-driven Business: How Leading Companies are Adopting Streaming StrategiesEvent-driven Business: How Leading Companies are Adopting Streaming Strategies
Event-driven Business: How Leading Companies are Adopting Streaming Strategies
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
 
ITS 833 – INFORMATION GOVERNANCEChapter 2 – Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 2 – Information Go.docxITS 833 – INFORMATION GOVERNANCEChapter 2 – Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 2 – Information Go.docx
 
Transform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and OrchestrationTransform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and Orchestration
 
Data Lakes for Business: Big Data 2018
Data Lakes for Business: Big Data 2018Data Lakes for Business: Big Data 2018
Data Lakes for Business: Big Data 2018
 
Eliminate Workload Automation Guess Work with Machine Learning
 Eliminate Workload Automation Guess Work with Machine Learning Eliminate Workload Automation Guess Work with Machine Learning
Eliminate Workload Automation Guess Work with Machine Learning
 
Navigating Modern Endpoint Management Complexities
Navigating Modern Endpoint Management ComplexitiesNavigating Modern Endpoint Management Complexities
Navigating Modern Endpoint Management Complexities
 
Network Performance Management Strategies for the Digital Enterprise
Network Performance Management Strategies for the Digital EnterpriseNetwork Performance Management Strategies for the Digital Enterprise
Network Performance Management Strategies for the Digital Enterprise
 

Mehr von Enterprise Management Associates

Mehr von Enterprise Management Associates (20)

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Achieving Effective Identity and Access Governance

  • 1. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Steve Brasen Research Director – Endpoint and Identity Management Enterprise Management Associates Achieving Effective Identity and Access Governance
  • 2. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Watch the On-Demand Webinar Slide 2 • Achieving Effective Identity and Access Governance On- Demand webinar is available here: http://info.enterprisemanagement.com/achieving-effective-identity- and-access-governance-webinar-ws • Check out upcoming webinars from EMA here: http://www.enterprisemanagement.com/freeResearch
  • 3. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Featured Speaker Steve Brasen, Research Director, EMA Steve's career at EMA follows 20+ years of “in the trenches” experience in IT systems support, engineering, and management for high technology, telecommunications, and financial institutions. Steve's primary focus area at EMA is on endpoint management topics, including enterprise mobile management, client lifecycle management, desktop virtualization, and workspace management.
  • 4. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Logistics Slide 4 © 2019 Enterprise Management Associates, Inc. An archived version of the event recording will be available at www.enterprisemanagement.com • Log questions in the chat panel located on the lower left- hand corner of your screen • Questions will be addressed during the Q&A session of the event QUESTIONS EVENT RECORDING
  • 5. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Steve Brasen Research Director – Endpoint and Identity Management Enterprise Management Associates Achieving Effective Identity and Access Governance
  • 6. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Sponsored by: Slide 6 © 2019 Enterprise Management Associates, Inc.
  • 7. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Agenda Slide 7 © 2019 Enterprise Management Associates, Inc. • Understanding Identity and Access Governance • Research and Methodology • Business Requirements and Challenges for Identity and Access Governance • Effective Governance Policies, Processes, and Audits • Achieving Business Goals for Identity and Access Governance • Conclusions
  • 8. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Understanding Identity and Access Governance The first line of defense in enterprise security is identity and access management (IAM) • Identity management positively determines who is requesting access • Access management controls the resources identified that users have access to and the ways in which they can use them Slide 8 © 2019 Enterprise Management Associates, Inc. Identity and access governance processes orchestrate the policy-based controls that enable organizations to meet enterprise IT security and compliance initiatives. • Defines the policies enforced by IAM controls
  • 9. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Understanding Identity and Access Governance Key elements of identity and access governance include:  Policy Development  Policy Enforcement  Policy Review  Auditing  User and Group Administration  Identity Intelligence  Privileged Access Management Slide 9 © 2019 Enterprise Management Associates, Inc.
  • 10. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Research and Methodology EMA conducted primary, survey-based research to identify optimal approaches to identity and access governance Slide 10 © 2019 Enterprise Management Associates, Inc. Survey Demographics • 206 respondents • All respondents were from North America • Respondents were IT and security managers knowledgeable about their organization’s identity and access management requirements and solutions • Respondents were from a wide range of industry verticals and horizontals
  • 11. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Business Requirements and Challenges Identity and access governance is considered an essential practice by the majority of businesses Slide 11 © 2019 Enterprise Management Associates, Inc. Percentage of respondents indicating how important identity and access governance is to their organization
  • 12. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Business Requirements and Challenges While most organizations deliver IT services directly to their employees, many also extend access to users outside their business Slide 12 © 2019 Enterprise Management Associates, Inc. Percentage of respondents indicating the types of users who access enterprise IT resources
  • 13. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Business Requirements and Challenges Governance practices are also encumbered by the diversity of resources accessed by supported users Slide 13 © 2019 Enterprise Management Associates, Inc. Percentage of respondents indicating types of hosted IT resources that require identity and access controls governed by their organization
  • 14. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Business Requirements and Challenges 85% of survey respondents indicated that users in their organization violated business IAM policies in the preceding 12 months Slide 14 © 2019 Enterprise Management Associates, Inc. Percentage of respondents indicating consequences that occurred due to a violation of their organization’s identity and access management policies
  • 15. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Governance Policies, Processes, and Audits The practices managed by a governance board can vary greatly depending on the type of business and required level of security. Slide 15 © 2019 Enterprise Management Associates, Inc. Percentage of respondents indicating processes that are actively overseen by a governance body in their organization
  • 16. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Governance Policies, Processes, and Audits There is a direct correlation between the frequency of audits and an organization’s ability to detect policy violations. Slide 16 © 2019 Enterprise Management Associates, Inc. Percentage of users in respondent’s organization who were detected violating identity and access policies in the last year (segmented by the average frequency of audits)
  • 17. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Governance Policies, Processes, and Audits The effort necessary to perform frequent governance audits is directly attributable to the number and complexity of audit tasks. Slide 17 © 2019 Enterprise Management Associates, Inc. Percentage of respondents indicating the processes included in formal identity and access governance audits
  • 18. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Achieving Business Goals for Governance Identity and access governance platforms provide a wide range of features for automating and managing processes across the breadth of governance requirements. Slide 18 © 2019 Enterprise Management Associates, Inc. Percentage of respondents indicating the most important features of an identity and access governance platform
  • 19. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Achieving Business Goals for Governance The value achieved from adopting an identity and access governance platform is quantified by reviewing the level of difficulty in performing specific tasks Slide 19 © 2019 Enterprise Management Associates, Inc. Comparing platform adopters to non-adopters on the LEVEL OF DIFFICULTY in performing identity and access governance tasks
  • 20. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Achieving Business Goals for Governance Difficult tasks are not necessarily time-consuming (and vice versa), but the amount of time spent performing tasks is also affected by the adoption of a governance platform Slide 20 © 2019 Enterprise Management Associates, Inc. Comparing platform adopters to non-adopters on HOW TIME-CONSUMING it is to perform identity and access governance tasks
  • 21. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Achieving Business Goals for Governance The financial cost of performing governance tasks was also determined to be broadly mitigated by the adoption of governance platforms Slide 21 © 2019 Enterprise Management Associates, Inc. Comparing platform adopters to non-adopters on HOW FINANCIALLY COSTLY it is to perform identity and access governance tasks
  • 22. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Conclusions  Effective identity and access governance requires the establishment of holistic visibility across their entire IT ecosystem  Audit and reporting processes must be performed at least once every month to close potential risks and ensure existing policies accurately reflect business requirements  An automated identity and access governance platform is essential to easily and cost- effectively achieving continuous compliance and risk mitigation Slide 22 © 2019 Enterprise Management Associates, Inc.
  • 23. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Questions? Slide 23 © 2019 Enterprise Management Associates, Inc. Get the full report at http://bit.ly/2WFvFKc