new research: cloud, cost & complexity impact iam & it
TRANSCRIPT
Symplified was founded on the principle that identity is central to enterprise security. Today the company delivers an identity management services platform that manages user identities and access across any device or application, located on premises or in the cloud, anywhere in the world.
Research methodology: Symplified commissioned a survey conducted October 12 – 13, 2013 among 63 IT decision makers in firms with
3,000 or more employees who completed an online survey designed by Lawless Research LLC and programmed via Qualtrics, Inc. The
margin of error is +/- 12 percentage points at the 95 percent level of confidence.
About Symplified Symplified delivers a secure, comprehensive identity management services platform to manage user
identities and access across any device or application, located on premises or in the cloud, for businesses
around the world.
To learn more, visit www.symplified.com.
Cloud, Cost + Complexity
84%73%
44%
24% 19%
11%
MOBILEEMPLOYEES
CONTRACTORS
BUSINESS CUSTOMERS
PARTNERS
CONSUMER CUSTOMERS
S E C U R I T Y A N D T O T A L C O S T O F O W N E R S H I P are top priorities in identity management.
In a survey of enterprises managing a total of
4.5 Symplified gauged IAM priorities and pain points including:
SECURITY
COST
B E C A U S E N O S I N G L E T R A D I T I O N A L I A M P R O D U C T M E T A L L O F T H E I R N E E D S . . .
...many enterprises have created, and are now burdened with managing, a patchwork of multiple solutions. Mobile identities and the growing number of new applications are also common challenges.
19%
14%
R E G U L A T O R Y C O M P L I A N C E is among the top three most important goals enterprises want to address via IAM.
USING MULTIPLE TOOLS TO MANAGE IAM (E.G., ON-PREMISE, SPREADSHEETS, ACTIVE DIRECTORY, LDAP)
T H E M I G R A T I O N O F A P P L I C A T I O N S T O C L O U D S E R V I C E S . . . ...mobility and the need to manage non-employees' access to sensitive materials are challenging CIOs everywhere. IT is expected to do more with less while the volume of users, the diversity of their requirements, the proliferation of applications, and the demand for BYOD all explode.
MANAGING ACCESS W/OUT REPLICATING USER DATA
AUDITING USER ACTIVITIES WITHIN AN APPLICATION
MANAGING IDENTITY AND ACCESS FOR MOBILE DEVICES
OFFICE-BASED EMPLOYEES
M A N Y L A R G E O R G A N I Z A T I O N S A R E G R A P P L I N G
TIME AND EFFORT REQUIRED TO ADD NEW APPLICATIONS
MANAGING IDENTITY AND ACCESS FOR CLOUD-BASED APPLICATIONS
24%
24%
28%
28%
75%O F E N T E R P R I S E S M A N A G E
M O B I L E I D E N T I T I E S .
I N T H E E R A O F T H E E X T E N D E D E N T E R P R I S E :Fewer boundaries exist thanks to continuous innovations in cloud and mobile technologies; business applications are now on premises, cloud- and SaaS-based; and users extend beyond onsite employees to include contractors, customers and partners.
C H A L L E N G I N G T R A D I T I O N A L I D E N T I T Y M A N A G E M E N T M O D E L
I N C R E A S I N G L Y C O M P L E X M I X O F U S E R S :
M O S T I M P O R TA N T C R I T E R I A F O R I M P L E M E N T I N G A N I A M S Y S T E M :
PROVIDING + CONTROLLING ACCESS TO CLOUD-BASED APPLICATIONS
MANAGE COST OF IDENTITY AND ACCESS ADMINISTRATION
SIMPLIFY MANAGEMENT OF IAM
I D E N T I T Y A N D A C C E S S M A N A G E M E N T G O A L S , R A N K E D O N I M P O R TA N C E .
57%
20%
DATA SECURITY AND PRIVACY
36%
EFFICIENT SERVICE DELIVERY
TO USERS (PASSWORDS AND
ACCESS TO APPLICATIONS)
PROTECT SECURITY OF WEB AND MOBILE APPLICATIONS
ACCESSING APPLICATIONS AND DATA ON MOBILE DEVICES
with how to address these new challenges in identity and access management (IAM) with the legacy solutions they already have in place.
29%
29%
18%
27%2725% 21%
ONBOARDING AND PROMOTING VISIBILITY OF NEW APPLICATIONS
ON-PREMISEON-
PREMISE
T O P I D E N T I T Y A N D A C C E S S M A N A G E M E N T C H A L L E N G E S
10%UPFRONTCOST
60%
54%
51%
51%
48%
37%
37%
24%
27%
UP-TIME
TOTAL COSTOF OWNERSHIP
SECURITY OFCREDENTIALS
EASE OF IMPLEMENTATION
ACCESS FOR EXTERNAL USERS
EASE OF CONFIGURATION MANAGEMENT
COVERAGE FOR CORPORATE APPLICATION ON MOBILE DEVICES
TECHNICAL SUPPORT
COVERAGE FOR CLOUD-BASED APPLICATIONS
SCALABILITY
COMPLEXITY
MILLION GLOBAL IDENTITIES
the
O F E N T E R P R I S E S M A N A G E I D E N T I T I E S F O R A T L E A S T O N E T Y P E O F E X T E R N A L U S E R
50%