Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 23 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Traditional PAM solutions aren’t working, Keeper Security study finds

by Guru Writer
February 15, 2023
in Featured, Research
Share on FacebookShare on Twitter

Keeper Security, the provider of cloud-based zero-trust and zero-knowledge cybersecurity software protecting passwords, secrets and connections, has released findings from its Privileged Access Management Survey: User Insights on Cost & Complexity. The report explores global insights from IT and security executives, revealing an overwhelming industry desire for Privileged Access Management (PAM) solutions that are easier to deploy and maintain. In fact,  84% of global IT leaders say they want to simplify their PAM solutions in 2023.

As cybersecurity threats continue to grow, IT leaders are seeking effective PAM solutions that can provide visibility, security, control and reporting across every user, on every device, the company said. PAM adoption is widespread, with 91% of survey respondents saying their organisations use a PAM product. But the findings show traditional PAM products are failing to meet organisational needs. More than two-thirds of IT managers (68%) say their current PAM product is too complicated or has too many features they don’t use, and 87% of respondents would prefer a pared down form of PAM that is easier to deploy and use.

 

Additional noteworthy report findings show:

  • On average, IT teams only use 62% of their current PAM functionality. Fifty-eight percent of respondents agree there is waste in their PAM solution.

  • Roughly two-thirds of survey respondents indicate that pricey and superfluous PAM features create too much complexity for users, reducing user satisfaction.

  • More than half of all IT teams (56%) report they tried to deploy a PAM solution but never implemented it. Of those, 92% said it was because their PAM solution was too complex. 

  • Most organisations (85%) say their PAM product requires dedicated staff to manage and maintain. 

  • Two-thirds of IT leaders (66%) say they need a better PAM solution, but 58% say they do not have one because it is too expensive.

 

“Organisations must secure their privileged credentials, accounts and sessions to protect themselves,” said Darren Guccione, CEO and co-founder of Keeper Security. “The Privileged Access Management Survey: User Insights on Cost & Complexity reveals why IT and security leaders are dissatisfied with traditional PAM products. The industry needs modern, unified PAM solutions that address perimeterless, multi-cloud IT environments and distributed remote workforces.  These solutions must provide essential functionality with zero-trust security, and at the same time, be cost-effective, easy to implement and engaging for end users.” 

 

Streamlined PAM solutions meet new operational challenges

Alarmingly, nearly two-thirds of IT leaders (62%) say the downturn in economic conditions will likely cause them to scale back their current PAM platform. Today’s IT and security leaders require a PAM solution that protects their most sensitive systems without the complexity and unnecessary features that drive up costs. The research shows their top criteria include solutions that are quick to deploy, affordable, and simple to understand and integrate.

 

Based on the survey results, the top five benefits IT leaders seek in a PAM solution include: 

  1. Managing and monitoring privileged user access
  2. Protecting against compromise of privileged credentials by external threat actors
  3. Preventing data breaches
  4. Protecting against accidental or deliberate misuse of privileged access by company insiders
  5. Ensuring privileged user access is updated to prevent “privilege creep”

 

Respondents also share the top five benefits of a simplified PAM solution:

  1. Easier to deploy
  2. Easier to integrate into other systems
  3. Cost savings
  4. Consolidated platform
  5. Requires less staff

 

The digital landscape continues evolving beyond the average IT professional’s control. To maintain visibility and stay ahead of the next wave of cyberthreats, IT and security leaders must adapt, automate and advance with the ever-changing workplace. While PAM solutions are primarily designed to protect IT staff, executive leadership, and research and development staff, the accelerated digital transformation and current high-risk security climate make protecting all end-users within an organisation increasingly essential.

 

 

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Dragos Report Identifies Two New Threat Groups

Next Post

Gilad Gruber Appointed as Senior Vice President of Engineering at Salt Security

Recent News

call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023
Ferrari Data Breach: The Industry has its say

Ferrari Data Breach: The Industry has its say

March 22, 2023
security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information