Centrify Confirms the Enterprise Security Industry Has Failed to Stop Breaches
Organizations spend $75B on security, yet Centrify-commissioned Forrester study reveals 83 percent are at high risk, and being breached at an alarming rate
February 14, 2017
Santa Clara, CA — Centrify, the leader in securing hybrid enterprises through the power of identity services, commissioned a new Forrester study that revealed the enterprise security industry is failing, with organizations being breached at an alarming rate. The study found an astonishing two-thirds of organizations experienced an average of five or more security breaches in the past two years, and hackers compromised more than one billion identities in 2016 alone.
“Cybersecurity breaches are causing more havoc and affecting more industries than ever before,” said Tom Kemp, CEO of Centrify. “Despite over $75 billion spent on cybersecurity in 2016, the products and services from major security companies have failed to stop breaches from occurring, and in fact, the problem is getting worse. This clearly indicates that traditional approaches are flat out not working in this age of access.”
For years now, organizations have relied on a well-defined boundary, supported by digital walls and gatekeepers, to protect their assets. But today, with the rapid introduction of new technologies, platforms, applications and practices, that border has disintegrated, resulting in significant exposure for the global enterprise. With 90 percent of all enterprises moving to the cloud, and billions of users accessing data across millions of applications, enterprises face an increasingly complex digital canvas of identities. These identities live in and out of the enterprise, creating a new dimension in security. Most accessed by one simple permission: the password.
“Organizations need to completely rethink their security approach, and in today’s world of access they must increase their Identity and Access Management (IAM) maturity to more effectively reduce the likelihood of a data breach,” said Kemp. “Centrify’s mandate is to ensure the breach stops here by providing a single platform to secure each user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise.”
In fact, the study concluded that 83 percent of organizations do not have a mature approach to Identity and Access Management (IAM) resulting in two times more breaches and $5 million more in costs. The study further concluded that 91 percent of organizations with the most mature IAM stances gravitate toward integrated IAM platforms, rather than relying on multiple point solutions, and spend 40 percent less on technology. The more mature IAM approach showed direct correlation to reduced security risk, improved productivity, increased privileged activity management and greatly reduced financial loss over their less mature counterparts.
The Impact of IAM Maturity
The Forrester research study, which surveyed more than 200 enterprise IT security decision-makers in charge of identity and access management, revealed that:
- Organizations with the highest IAM maturity experience half the number of breaches as the least mature. For instance, they are 46 percent less likely to suffer a server or application breach, 51 percent less likely to suffer a database breach and 63 percent less likely to suffer cloud infrastructure breach.
- Organizations that secure both regular and privileged access are less likely to experience a breach compared to those organizations that adopt fewer best practices. Forrester estimates that 80 percent of security breaches involve privileged credentials that typically belong to the IT professionals who administer the systems, databases and networks of an organization.
- Organizations with the least IAM maturity averaged over 12 breaches, more than twice the number of breaches of the most mature, and endure more than $5 million more in financial damage.
- Mature companies spend more on overall IT security versus the least mature companies, but actually spend less on IAM technology as a percentage of their entire budget—40 percent less. This translates into an additional cost savings of $2,582,000, which not only makes these organizations more capital efficient, but also allows them to better streamline their IT infrastructure by eliminating redundant IAM technologies.
In this study, Forrester concluded that a maturity hierarchy exists in the marketplace. The most mature groups employ more IAM approaches as well as use integrated IAM technology platforms to reduce security risk and may avoid millions in data breach costs over their less mature counterparts.
Download the full study here.
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure each user’s access to apps and infrastructure through the power of identity services. This is Next Dimension Security in the Age of Access. Centrify is enabling over 5,000 customers, including over half the Fortune 50, to defend their organizations. To learn more visit www.centrify.com.
The Breach Stops Here.
###Centrify is a registered trademark and Centrify Server Suite, Centrify Privilege Service and Centrify Identity Service are trademarks of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective
Ready to protect against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.