Survey: 92% of Global Organizations Indicate Identity Security as Critical for a Robust Zero Trust Implementation
March 28 2023 - 8:30AM
Business Wire
CyberArk Introduces Peer-Based Framework for
Evaluating and Maturing Identity Security Strategies
CyberArk (NASDAQ: CYBR), the global leader in Identity Security,
today announced findings of a global survey that explores trends in
Identity Security adoption and the relative maturity of
organizations embarking on related strategies. Results show that
only 9% of organizations are taking an agile, holistic and mature
approach to securing identities throughout their hybrid and
multi-cloud environments. The report features an Identity Security
maturity model to help cybersecurity leaders assess their current
strategies, uncover risks and take steps to strengthen cyber
resilience.
Experts Recognize Identity Security as Critical Path for
Cyber Resilience
“The Holistic Identity Security Maturity Model: Raising the Bar
for Cyber Resilience”1 report features results from a survey of
1,500 cybersecurity professionals conducted by CyberArk and
Enterprise Strategy Group (ESG). Based on the global survey, the
data-driven model identifies 9% of organizations as those with the
most mature and holistic Identity Security strategies. These
Transformative organizations have a well-rounded focus on
implementing Identity Security tools, are inherently agile and
display a “fail fast, learn faster” characteristic even in times of
a successful cybersecurity attack. 42% of all respondents’ Identity
Security programs, however, are in the earliest stage of maturity
and lack foundational tools and integrations to quickly mitigate
identity-related risk. An expanding identity attack surface, IT
complexity and several organizational roadblocks contribute to this
widespread Identity Security deficit. Notable findings include:
- Strategy and Outcome Gap: 69% of C-level executives
believe they are making correct Identity Security-related decisions
compared to 52% of all other personnel (technical decision makers
and practitioners). The gap highlights the perception that overall
security can be achieved by making the right technology
investments. But that is only part of the story. Strategically
maximizing those investments to include implementation and
integration with existing environments, breaking down silos and
improved training are equally important.
- Disparate Endpoint Data: 92% of respondents believe that
endpoint security or device trust and identity management are
essential to a robust Zero Trust strategy, and 65% believe the
ability to correlate data is critical for effectively securing
endpoints.
- Fragmented Efforts: 58% of organizations have two teams
responsible for securing identities in the cloud and on-premises
and rely on numerous point solutions, making it difficult to
understand their real-time security posture.
“This research uncovers the relationship between a strong
Identity Security strategy and enhanced business outcomes,” said
Jack Poller, senior analyst, Enterprise Strategy Group (ESG). “More
frequent and timely maturity assessments can help ensure the right
users have access to the right data, and that organizations can act
quickly enough to stop threats before they stop business.”
A Peer-Based Framework for Security Experts to Mature
Holistic Identity Security Strategies
Drawing from these data-based peer insights, the Holistic
Identity Security Maturity Model framework is designed to help
organizations evaluate their maturity across four tenets of
Identity Security:
- Procurement of tools spanning management, privilege
controls, governance, authentication and authorization for all
identities and identity types.
- Integrations with other IT and security solutions within
the organization’s stack to secure access to all corporate assets
and environments.
- Automation to help ensure continuous compliance with
policies, industry standards and regulations, along with rapid
response to high-volume routine and anomalous events.
- Continuous threat detection and response capabilities
based on a solid understanding of identity behaviors and
organizational policies.
“While 63% of organizations admit to being a victim of
identity-based attacks, this percentage is likely much higher as
adversaries continue to successfully target and compromise
identities at scale,” said Amita Potnis, director, thought
leadership marketing, CyberArk. "The main focus for organizations
looking to adopt a mature holistic Identity Security strategy is to
secure access for all identities - human and machine - by breaking
down silos and adopting a consolidated and automated approach for
Identity Security. Our research indicates that many have already
begun investing in this journey, with 24% of organizations
committing more than 10% of their overall cybersecurity budget to
their Identity Security programs this year."
Transformative organizations, which account for 9% of the total
respondent base, have reached the pinnacle of maturity having
embraced a unified approach to Identity Security. The CyberArk
Identity Security Platform embodies this approach, applying
intelligent privilege controls to all identities – human and
machine – with continuous threat detection and prevention across
the entire identity lifecycle. With CyberArk, organizations can
enable Zero Trust and least privilege with complete visibility,
ensuring that every identity can securely access any resource,
located anywhere, from everywhere.
To access the full survey and framework, download the report:
https://www.cyberark.com/resources/analyst-reports/the-holistic-identity-security-maturity-model
Survey Methodology
The Enterprise Strategy Group (ESG) conducted a survey of 1,500
IT and security decision-makers in the third quarter of 2022. All
respondents operated in a multi-cloud environment and were
knowledgeable about their organization’s identity and access
management strategies and capabilities. They were based in North
America (US, Canada), Latin America (Mexico, Brazil), EMEA (Israel,
Germany, UK, Spain, Italy, Netherlands) and APJ (Australia, Hong
Kong, India, Japan, Singapore, Taiwan).
1 – Enterprise Strategy Group, “The Holistic Identity Security
Maturity Model: Raising the Bar for Cyber Resilience,” February
2023 by Jack Poller
About CyberArk
CyberArk (NASDAQ: CYBR) is the global leader in Identity
Security. Centered on privileged access management, CyberArk
provides the most comprehensive security offering for any identity
– human or machine – across business applications, distributed
workforces, hybrid cloud workloads and throughout the DevOps
lifecycle. The world’s leading organizations trust CyberArk to help
secure their most critical assets. To learn more about CyberArk,
visit https://www.cyberark.com, read the CyberArk blogs or follow
on Twitter via @CyberArk, LinkedIn or Facebook.
Copyright© 2023 CyberArk Software. All Rights Reserved. All
other brand names, product names, or trademarks belong to their
respective holders.
View source
version on businesswire.com: https://www.businesswire.com/news/home/20230328005242/en/
Media Contacts: Carissa Ryan, CyberArk Email:
press@cyberark.com
Highwire PR Email: cyberark@highwirepr.com
Investor Relations: Erica Smith, CyberArk Email:
ir@cyberark.com
CyberArk Software (NASDAQ:CYBR)
Historical Stock Chart
From May 2024 to Jun 2024
CyberArk Software (NASDAQ:CYBR)
Historical Stock Chart
From Jun 2023 to Jun 2024