Identity and Access Management in the Digital Age

Identity and Access Management in the Digital Age

A European study on how IT decision makers are transforming their businesses in the new digital age.

Also on KPMG.com

single computer turned on in a dark room

Pierre Audoin Consultants (PAC), sponsored by KPMG International, CyberArk and Sailpoint have released a European study entitled Identity and Access Management ('IAM') in the Digital Age.

The study, which is based on the survey of 202 information technology, security and business executives, provides valuable insights into how IT decision makers view IAM and its role in transforming their businesses.

As enterprises search for the right balance between security, user experience and a choice of digital channels that can be leveraged for efficient delivery of
every day services, IAM is not only the first line of protection against cyber
risks within the identity perimeter but it is also an integral component of
their digital enablement strategy.

The study has also underlined a number of recurring themes related to adoption of IAM, including training and enablement while flagging up emerging risks like the proliferation of Shadow IT with the adoption of cloud based services.

Key findings in the report show a significant awareness among senior IT decision makers

• Almost half (48 percent) have emphasized that threat and breach mitigation is a pre-requisite for digital transformation.

• Two thirds (65 percent) identified Shadow IT as a challenging development to the consistent implementation of IAM controls.

• Nine out of ten (92 percent) will increase investments in IAM in the next 3 years.

• Two thirds (65 percent) see consumer identities and applications as a factor in their next IAM investment.

• Lack of control over third party and contingent identities come second to the lack of training and understanding of IAM Policies as the most likely cause of IAM related breaches in the future.

Read the study and find out how you can master IAM investments and secure business data. 

Infographic

Identity and Access Management in the Digital Age.

 
Read more

Cyber Security

The threats from cyber adversaries are continuing to grow in scale and sophistication.

 
Read more

Connect with us

 

Request for proposal

 

Submit

KPMG’s new-look website

KPMG’s new-look website