Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Many organizations have room for growth when it comes to using identity to prevent data breaches

By Jackie Brinkerhoff
How Continous Is Continous Monitoring?
October 22, 2020

We’ve always kept a pulse on the security landscape. We believe the best way to continue to evolve and adapt our solutions to protect enterprise organizations, is by zooming in on the specific challenges of businesses today.

We recently surveyed companies across the U.S. about their current cybersecurity challenges now that many have moved to a predominantly remote workforce. Unfortunately, what we found was that most organizations are only scratching the surface when it comes to identity and access management, as they may only be addressing a fraction of what identity can provide. This is leaving many organizations exposed to data breach and compliance fines.

While many organizations see identity only as access management and authentication, identity is more than just granting/provisioning user access to apps. It goes deeper. Identity governance provides the backbone and brains of securing and managing access for every worker, human and nonhuman, so they only get the access they need to do their jobs successfully – no more, no less.  It does this by ensuring access is only granted if it adheres to your policies. It records every transaction/event where access is concerned. This is important because it allows you to answer three crucial questions: Who has access to what? Who should have access? And how are they using that access? If required, could you answer those questions today?  According to our survey responses, only 17% of organizations have an identity governance solution in place - this is a significant indicator that there is an exciting opportunity for organizations to uplevel their security efforts while at the same time streamlining IT workflows for enhanced productivity.

 

The findings

We asked respondents to pinpoint the top four challenges or risks they recently faced when managing identities during the COVID-19 crisis. They reported that they had poor management of accounts, including orphaned accounts or overentitled identities (41%) and limited visibility into user access across the organization (38%). To top this off, 30% lacked confidence that their access policies were current, and 56% struggle to identify which users/identities pose the highest risk.

The good news is that you can employ the strength of an AI-driven identity governance solution to ferret out what cannot be seen with human eyes. This includes discovering dormant accounts, outliers that possess excessive access, and seeing how access policies and roles should be updated as change occurs across the organization.

Of the organizations surveyed, 81% say that over half of the workforce at their respective companies are now working remotely, compared to only 11% that had half of their workforce working remotely before the COVID-19 outbreak. And, as we’ve seen recently, more and more companies are making arrangements to work from home indefinitely given the continued uncertainty surrounding the pandemic. It’s safe to say that remote work is not going away any time soon.

This means organizations must find a balance between keeping workers productive without compromising on security.  Our survey respondents indicated that they were currently challenged with finding a balance between security and operational functionality for remote workers (59%), and 23% mentioned the need to rapidly provision or de-provision access for large groups of employees was challenging. In contrast, remote – these both are areas where an AI-driven identity governance solution can shine. It does this by allowing you to place guardrails or policies, such as Separation of Duty, that prevents toxic access combinations that can lead to theft.  Also, an open identity governance platform enables you to connect to all resources found across your environment, making it possible to automate the process of granting and revoking access as worker status' change. This matters extraordinarily when compliance auditors inquire to see proof that accounts were properly terminated, and access revoked when workers left the company. 

Businesses will always face challenges. Some are outside of an organization's control – like a widespread pandemic – but others are entirely manageable with the right processes and technology. To effectively protect your organization, it’s essential that you not only grant and provision access but even more importantly, govern access for every identity within your business.  And, as this research shows, companies have room for growth in this area since they are leaving out a crucial part of the identity equation.

KEYWORDS: cyber security data breach remote workforce risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jackie Brinkerhoff is Senior Director of Product Marketing at SailPoint.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Most Countries without Cybersecurity Strategy

    SMBs increasingly have to ‘do more with less’ when it comes to cybersecurity

    See More
  • cyber software freepik

    When it comes to cyber risk, company size doesn't matter

    See More
  • Increase in Cybercrime Demands Fresh Attention to Employee Onboarding and Training

    When It Comes to Employee Security Awareness Training - Should You be Phishing or Teaching?

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing