Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 31 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

90 percent of IT decision makers think identity and access management is critical in the digital transformation process

by The Gurus
October 12, 2016
in Editor's News
Share on FacebookShare on Twitter

Ping Identity®, the leader in Identity Defined Security, today announced the availability of “The State of Digital Transformation Report 2016,” which highlights that digital transformation is a top priority and source of anxiety for enterprises, but the majority of IT decision makers have not completed technology deployments to address the initiatives that are critical to making the shift. Security and identity access management were respectively ranked the top two initiatives critical to digital transformation. The comprehensive report is available here and infographic is available here.
“Above cloud, mobile and IoT, enterprises view security and Identity and Access Management as the make-or-break factors for winning in the digital economy,” said Andre Durand, CEO of Ping Identity. “This research reveals how a company’s ability to succeed at everything from delivering personal, convenient and trusted mobile customer experiences to moving infrastructure to the more cost-efficient cloud hinges on having the right security measures in place, including secure access for employees, partners and customers.”
Building businesses that are fast, always-on and inherently digital is becoming the new norm across every industry due to the rise of SaaS, cloud and mobile technology. Companies are eliminating their data centres and moving their apps to Software-as-a-Service and Infrastructure-as-a-Service like AWS and Microsoft Azure. 100 year-old banks are rolling out mobile apps to compete with cloud- and mobile-first disruptors like Square and Stripe.
Ping Identity surveyed IT decision makers based in France, Germany, the United Kingdom and United States for a comprehensive report that details how the enterprises are prioritising initiatives to support digital transformation, including:

  • Creating a consistent customer experience across devices and/or channels
  • Providing mobile apps to customers and employees
  • Using cloud services for saving documents rather than on-premises servers or VPNs
  • Replacing legacy software with SaaS applications
  • Migrating on-premises applications to Infrastructure-as-a-Service
  • Engaging customers via smart, connected IoT services
  • Moving the internal manufacturing supply chain online
  • Onboarding partner organisations seamlessly

Cloud Remains a Top Priority, but Adoption is in its Infancy
The research revealed that cloud adoption is still nascent within the enterprise, but moving infrastructure to the cloud is a top digital transformation priority.

  • Fewer than one in ten have fully migrated to the cloud. Half have started migrating to cloud infrastructure (either private or public).
  • 86 percent say cloud adoption is important to their company’s success in digital transformation.
  • 83 percent believe that moving infrastructure to the cloud should be a board level priority, and 81 percent believe moving infrastructure to the cloud should be a top priority for most companies today.

Security is the Top Imperative and Obstacle for Success
IT decision-makers view security as the most important element to successfully making the digital transformation, but also the greatest roadblock to adopting cloud infrastructure, another critical digital enabler. Consequently, IT decision makers report that they are allocating more resources to security with the rise of cloud adoption.

  • 91 percent say security is very important to their company’s success in digital transformation, and half point to security as the most important factor.
  • 82 percent say security is more challenging as they’ve moved to the cloud.
  • 67 percent have purchased more security tools as they’ve implemented cloud.

Identity is a Linchpin for the Digital Economy  
The study showed that IT decision makers view identity and access management technology as a key enabler of digital transformation.

  • 90 percent say identity and access management technologies are critical to succeeding at digital transformation.
  • After security, IAM was ranked the second most important factor in their company’s success in digital transformation
  • 84 percent of respondents’ senior leadership think IAM is critical to adoption of cloud, and 89 percent agree that IAM is critical to mobility initiatives.
FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Shadow IT and Infrequent Audits Open Door to Data Security Vulnerabilities in the Cloud

Next Post

Attack Uses Image Steganography For Stealthy Malware Ops On Instagram

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information