Virtualization Technology News and Information
Article
RSS
Centrify Confirms the Enterprise Security Industry Has Failed to Stop Breaches

Centrify, the leader in securing hybrid enterprises through the power of identity services, commissioned a new Forrester study that revealed the enterprise security industry is failing, with organizations being breached at an alarming rate. The study found an astonishing two-thirds of organizations experienced an average of five or more security breaches in the past two years, and hackers compromised more than one billion identities in 2016 alone.

"Cybersecurity breaches are causing more havoc and affecting more industries than ever before," said Tom Kemp, CEO of Centrify. "Despite over $75 billion spent on cybersecurity in 2016, the products and services from major security companies have failed to stop breaches from occurring, and in fact, the problem is getting worse. This clearly indicates that traditional approaches are flat out not working in this age of access."

For years now, organizations have relied on a well-defined boundary, supported by digital walls and gatekeepers, to protect their assets. But today, with the rapid introduction of new technologies, platforms, applications and practices, that border has disintegrated, resulting in significant exposure for the global enterprise. With 90 percent of all enterprises moving to the cloud, and billions of users accessing data across millions of applications, enterprises face an increasingly complex digital canvas of identities. These identities live in and out of the enterprise, creating a new dimension in security. Most accessed by one simple permission:  the password.

"Organizations need to completely rethink their security approach, and in today's world of access they must increase their Identity and Access Management (IAM) maturity to more effectively reduce the likelihood of a data breach," said Kemp. "Centrify's mandate is to ensure the breach stops here by providing a single platform to secure each user's access to apps and infrastructure in today's boundaryless hybrid enterprise."

In fact, the study concluded that 83 percent of organizations do not have a mature approach to Identity and Access Management (IAM) resulting in two times more breaches and $5 million more in costs. The study further concluded that 91 percent of organizations with the most mature IAM stances gravitate toward integrated IAM platforms, rather than relying on multiple point solutions, and spend 40 percent less on technology. The more mature IAM approach showed direct correlation to reduced security risk, improved productivity, increased privileged activity management and greatly reduced financial loss over their less mature counterparts.

The Impact of IAM Maturity

The Forrester research study, which surveyed more than 200 enterprise IT security decision-makers in charge of identity and access management, revealed that:

  • Organizations with the highest IAM maturity experience half the number of breaches as the least mature.For instance, they are 46 percent less likely to suffer a server or application breach, 51 percent less likely to suffer a database breach and 63 percent less likely to suffer cloud infrastructure breach.
  • Organizations that secure both regular and privileged access are less likely to experience a breachcompared to those organizations that adopt fewer best practices. Forrester estimates that80 percent of security breaches involve privileged credentialsthat typically belong to the IT professionals who administer the systems, databases and networks of an organization.
  • Organizations with the least IAM maturityaveraged over 12 breaches, more than twice the number of breaches of the most mature,and endure more than $5 million more in financial damage.
  • Mature companiesspend more on overall IT security versus the least mature companies, but actuallyspend less on IAM technologyas a percentage of their entire budget-40 percent less. This translates into anadditional cost savings of $2,582,000, which not only makes these organizations more capital efficient, but also allows them to better streamline their IT infrastructure by eliminating redundant IAM technologies.

In this study, Forrester concluded that a maturity hierarchy exists in the marketplace. The most mature groups employ more IAM approaches as well as use integrated IAM technology platforms to reduce security risk and may avoid millions in data breach costs over their less mature counterparts.

Download the full study here.

Published Tuesday, February 14, 2017 8:56 AM by David Marshall
Filed under:
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<February 2017>
SuMoTuWeThFrSa
2930311234
567891011
12131415161718
19202122232425
2627281234
567891011