dcsimg

The Current State of Identity Management

  • The Current State of Identity Management-

    Ninety-four percent say it is important to be able to manage access, user identities and passwords quickly and efficiently, but only three in 10 IT professionals reported their companies have IAM solutions that allow them to see all access users have across systems. Thirty-four percent say their company doesn’t realize the value of IAM technology as an integral part of their arsenal of security tools.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10

The Current State of Identity Management

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
  • The Current State of Identity Management-7

    Ninety-four percent say it is important to be able to manage access, user identities and passwords quickly and efficiently, but only three in 10 IT professionals reported their companies have IAM solutions that allow them to see all access users have across systems. Thirty-four percent say their company doesn’t realize the value of IAM technology as an integral part of their arsenal of security tools.

According to a recent survey conducted by Harris Interactive on behalf of Quest Software, U.S. workers and IT professionals agree that multiple passwords, used to access everything from websites to business applications such as HR or CRM systems, now make it more difficult for employees to get their jobs done.

More than 60 percent of those polled said that while companies are strengthening password complexity policies, the need to manage multiple passwords is a burden. In fact, 28 percent of U.S. white collar workers said that they must remember more than five passwords for work, while IT professionals must manage, on average, nine separate passwords. The result of password overload is added workplace stress and feelings of frustration when workers can’t access a system due to a lost password. Fifty-nine percent said they become stressed or angry when they lose a password or get locked out of program at work.

From a security perspective, 10 percent of IT professionals said they can still access accounts and systems associated with a prior job. This access increases an organization’s risk of threats that could take down the entire infrastructure, all because a former employee’s access was not terminated.

More Slideshows:


2011 Salary Negotiation Tactics Experts offer key pointers on approaching the subject of salary as the economy evolves in 2011.

Top Outsourcing Trends for Q4 2010 The latest outsourcing trends identified by the Everest Group.


Seven Critical Questions to Ask Before Developing a Social Media Policy Increase project success rates by providing well-defined guidance for social media initiatives.