1
End-user access to information resources Access to applications Global Trends in Identity Governance & Access Management: North America The Report The companies represented in the study have no defined process for granting access. As a result, 58 % of respondents believe that users have more access than their jobs require. Excess Access Download the full report > 65 % of respondents say that employees view IT security as a bottleneck when assigning and managing access rights. Employee Frustration Access Provisioning: 43 % say the process for responding to user access requests is burdensome. 45 % say that they can’t keep pace with the number of access change requests. Fractured Management 64 % observe that employees are frustrated with the current access management process. IT operations and information security are responsible for granting end user access to information resources. But line of business managers grant access to applications. Cloud environments are even more decentralized, with application owners granting access in some organizations. Application owners Burdensome, time-consuming Who’s R eally in Control Of Access Provisioning? North American Trends in Identity Governance & Access Management report from Ponemon Institute: July 2016 to August 2016 The author of this report, Ponemon Institute , conducts independent research on privacy, data protection, and information security policy. The purpose of this Micro Focus sponsored study is to understand companies’ ability to protect access to secretive and confidential information and how the process can be made more secure and efficient. This research is part of a larger study that surveyed 2,580 IT and IT security practitioners around the globe. The collated findings are presented in a separate Global Report.

Who's Really in Control of Access Provisioning?

  • Upload
    netiq

  • View
    48

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Who's Really in Control of Access Provisioning?

End-user access to information resources

Access to applications

Global Trends in Identity Governance & Access Management: North America The Report

The companies represented in the study have no defined process for granting access.

As a result, 58% of respondents believe that users have more access than their jobs require.

Excess Access

Download the full report >

65% of respondents say that employees view IT security as a bottleneck when assigning and managing access rights.

Employee Frustration

Access Provisioning:

43% say the process for responding to user access requests is burdensome.

45% say that they can’t keep pace with the number of access change requests.

Fractured Management

64% observe that employees are frustrated with the current access management process.

IT operations and information security are responsible for granting end user access to information resources. But line of business managers grant access to applications.

Cloud environments are even more decentralized, with application owners granting access in some organizations.

Application owners

Burdensome,time-consuming

Who’s Really in Control Of Access Provisioning?

North American Trends in Identity Governance & Access Management report from Ponemon Institute: July 2016 to August 2016

The author of this report, Ponemon Institute, conducts independent research on privacy, data protection, and information security policy. The purpose of this Micro Focus sponsored study is to understand companies’ ability to protect access to secretive and confidential information and how the process can be made more secure and efficient. This research is part of a larger study that surveyed 2,580 IT and IT security practitioners around the globe. The collated findings are presented in a separate Global Report.