SailPoint Market Pulse Survey Highlights Major Gaps in Governance of Emerging Technologies
AUSTIN, March 5, 2014 – SailPoint today published an infographic based on the company’s annual Market Pulse Survey, which measures IT leaders’ attitudes toward identity and risk management, as well as how effectively companies are governing access to key data as new technologies take hold in the enterprise. The infographic, “Data Security Storm Brewing as Cloud and BYOD Add to the IAM Puzzle,” outlines recent research results that indicate that while global enterprises are embracing – and in some instances mandating – the use of cloud and mobile technologies, they do not have IT controls in place to properly manage them. Without the proper preventive and detective controls, those enterprises are ultimately putting themselves at an increased risk of fraud, theft, and privacy breaches.
SailPoint’s “Data Security Storm Brewing as Cloud and BYOD Add to the IAM Puzzle” infographic is available for download. (Interested parties have permission to embed and share the infographic on their websites or blogs with attribution.)
SailPoint’s recent Market Pulse Survey found a complex IT landscape, where enterprises are still catching up to the required levels of oversight and control needed to govern new technologies as part of their overall security and risk management program. The infographic outlines key findings from the survey, including:
- 63% of enterprises now require IT decision makers to evaluate cloud applications as part of every software procurement process. Already, 39% of mission-critical applications are currently stored in the cloud, which will increase to 59% by 2016.
- 82% of respondents allow employees to use their personal devices to access company data or applications at work. However, cloud and bring-your-own-device (BYOD) trends are glaringly absent from most companies’ security programs. In fact, as many as 41% of respondents admitted to an inability to manage cloud and BYOD as part of their identity and access management strategy.
- Exacerbating the problem, less than half the respondents have a process in place to automatically remove mission-critical data from mobile devices, while 46% of respondents are not even confident in their ability to grant or revoke employee access to applications across their entire IT environment.
- Because of the lack of visibility, 52% of respondents admit that employees have read or seen company documents that they should not have had access to, and 51% believe that it’s “just a matter of time” before a security breach occurs.
The 2013 SailPoint Market Pulse Survey is based on interviews of 400 IT decision makers at companies with at least 5,000 employees. Respondents were spread evenly across the US and UK, and owned budgets of $606 million and £665 million respectively. Interviews were conducted via an online panel. Loudhouse, an independent research agency, conducted the research on behalf of SailPoint. Download the 2013 SailPoint Market Pulse Survey whitepaper and supporting infographic.
As the fastest-growing, independent identity and access management (IAM) provider, SailPoint helps hundreds of the world’s largest organizations securely and effectively deliver and manage user access from any device to data and applications residing in the datacenter, on mobile devices, and in the cloud. The company’s innovative product portfolio offers customers an integrated set of core services including identity governance, provisioning, and access management delivered on-premises or from the cloud (IAM-as-a-service). For more information about SailPoint, please visit our Home Page.[/vc_column_text][/vc_column][/vc_row]