English

Reduce the Likelihood of an Attack Through an
IAM Maturity Model

forrester_maturity_model.jpg

Forrester Estimates that 80% of Security Breaches Involve Privileged Credentials.

In December 2016, Centrify commissioned Forrester Consulting to evaluate identity and access management (IAM) practices and technology among large enterprises. Their report found that:

  • Two-thirds of organizations have experienced a breach in the last two years.
  • Increased adoption of IAM best practices correlates to a reduced likelihood of an organization experiencing a breach.
  • Mature organizations realize higher end-user productivity, improved transparency, and reduced findings from compliance audits.
  • Companies that experience fewer breaches gravitate towards an integrated platform solution for IAM technology.

Download My Free Copy

Security breaches are now commonplace — two-thirds of organizations have experienced one in the past two years, and hackers compromised more than 1 billion identities in 2016 alone.

IT security must now become mission critical for organizations to both maintain customer trust and prevent financial ruin. It is therefore imperative that they identify the most prescient threats to quickly adopt the right practices and technology necessary for survival.

In December 2016, Centrify commissioned Forrester Consulting to evaluate identity and access management (IAM) practices and technology among large enterprises. Forrester specifically tested the hypothesis that increased adoption of IAM best practices —

namely those focusing on privileged identity management — correlate to a reduced likelihood of an organization experiencing a breach, which translates to reduced financial loss that an organization must endure.

In conducting surveys with 203 IT security decision-makers in North America as well as two in-depth interviews, Forrester found that a maturity hierarchy exists in the marketplace — the most mature groups employ more IAM approaches as well as use integrated IAM technology platforms to reduce security risk and may avoid millions in data breach costs over their less mature counterparts.