Identity security is proving more important for zero trust than ever

For almost all enterprise IT and security decision-makers, endpoint security or device trust and identity management are essential to a rob...

For almost all enterprise IT and security decision-makers, endpoint security or device trust and identity management are essential to a robust Zero Trust strategy. However, only a handful of organizations are actually putting an effort in this direction, leaving most firms at risk of destructive cyberattacks.

This is according to “The Holistic Identity Security Maturity Model: Raising the Bar for Cyber Resilience” report, recently published by identity security experts CyberArk. 

After polling 1,500 IT and security decision-makers around the world, that operate in a multi-cloud environment, the company found that for nearly all (92%) of the respondents, device trust and identity management are key for Zero Trust. Furthermore, roughly two-thirds (65%) of the respondents believe the ability to correlate data is critical for effectively securing endpoints. 

Mature and holistic strategies

But most companies have a long way to go in that respect. Less than a tenth (9%) of organizations were identified as having “mature and holistic” Identity Security strategies. For CyberArk, these firms are “transformative” and have a “well-rounded focus on implementing Identity Security tools”. They are also “inherently agile” and display a “fail fast, learn faster” characteristic, even when faced with a successfully pulled-off cyberattack.

CyberArk also hints that it’s going to take quite some time before things turn for the better, as 42% of all respondents’ Identity Security programs are in the early stages of maturity and lack foundational tools and integrations for a quick mitigation of identity-related risk. 

“An expanding identity attack surface, IT complexity and several organizational roadblocks contribute to this widespread Identity Security deficit,” the researchers concluded.

There also seems to be a perception gap between C-level executives and other staff (technical decision-makers and practitioners) when it comes to Identity Security-related decisions. While 69% of the C-suite believe they’re making the right calls, just 52% of other staff would agree. 



from TechRadar - All the latest technology news https://ift.tt/ytEknAO
via IFTTT

COMMENTS

BLOGGER
Name

Apps,3858,Business,151,Camera,1155,Earn $$$,3,Gadgets,1741,Games,926,GTA,1,Innovations,3,Mobile,1697,Paid Promotions,5,Promotions,5,Sports,1,Technology,8106,Trailers,796,Travel,37,Trending,4,Trendly News,25335,TrendlyNews,126,Video,5,XIAOMI,13,YouTube - 9to5Google,125,
ltr
item
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews: Identity security is proving more important for zero trust than ever
Identity security is proving more important for zero trust than ever
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews
http://www.trendlynews.in/2023/04/identity-security-is-proving-more.html
http://www.trendlynews.in/
http://www.trendlynews.in/
http://www.trendlynews.in/2023/04/identity-security-is-proving-more.html
true
3372890392287038985
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy