Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Many organizations have room for growth when it comes to using identity to prevent data breaches

By Jackie Brinkerhoff
How Continous Is Continous Monitoring?
October 22, 2020

We’ve always kept a pulse on the security landscape. We believe the best way to continue to evolve and adapt our solutions to protect enterprise organizations, is by zooming in on the specific challenges of businesses today.

We recently surveyed companies across the U.S. about their current cybersecurity challenges now that many have moved to a predominantly remote workforce. Unfortunately, what we found was that most organizations are only scratching the surface when it comes to identity and access management, as they may only be addressing a fraction of what identity can provide. This is leaving many organizations exposed to data breach and compliance fines.

While many organizations see identity only as access management and authentication, identity is more than just granting/provisioning user access to apps. It goes deeper. Identity governance provides the backbone and brains of securing and managing access for every worker, human and nonhuman, so they only get the access they need to do their jobs successfully – no more, no less.  It does this by ensuring access is only granted if it adheres to your policies. It records every transaction/event where access is concerned. This is important because it allows you to answer three crucial questions: Who has access to what? Who should have access? And how are they using that access? If required, could you answer those questions today?  According to our survey responses, only 17% of organizations have an identity governance solution in place - this is a significant indicator that there is an exciting opportunity for organizations to uplevel their security efforts while at the same time streamlining IT workflows for enhanced productivity.

 

The findings

We asked respondents to pinpoint the top four challenges or risks they recently faced when managing identities during the COVID-19 crisis. They reported that they had poor management of accounts, including orphaned accounts or overentitled identities (41%) and limited visibility into user access across the organization (38%). To top this off, 30% lacked confidence that their access policies were current, and 56% struggle to identify which users/identities pose the highest risk.

The good news is that you can employ the strength of an AI-driven identity governance solution to ferret out what cannot be seen with human eyes. This includes discovering dormant accounts, outliers that possess excessive access, and seeing how access policies and roles should be updated as change occurs across the organization.

Of the organizations surveyed, 81% say that over half of the workforce at their respective companies are now working remotely, compared to only 11% that had half of their workforce working remotely before the COVID-19 outbreak. And, as we’ve seen recently, more and more companies are making arrangements to work from home indefinitely given the continued uncertainty surrounding the pandemic. It’s safe to say that remote work is not going away any time soon.

This means organizations must find a balance between keeping workers productive without compromising on security.  Our survey respondents indicated that they were currently challenged with finding a balance between security and operational functionality for remote workers (59%), and 23% mentioned the need to rapidly provision or de-provision access for large groups of employees was challenging. In contrast, remote – these both are areas where an AI-driven identity governance solution can shine. It does this by allowing you to place guardrails or policies, such as Separation of Duty, that prevents toxic access combinations that can lead to theft.  Also, an open identity governance platform enables you to connect to all resources found across your environment, making it possible to automate the process of granting and revoking access as worker status' change. This matters extraordinarily when compliance auditors inquire to see proof that accounts were properly terminated, and access revoked when workers left the company. 

Businesses will always face challenges. Some are outside of an organization's control – like a widespread pandemic – but others are entirely manageable with the right processes and technology. To effectively protect your organization, it’s essential that you not only grant and provision access but even more importantly, govern access for every identity within your business.  And, as this research shows, companies have room for growth in this area since they are leaving out a crucial part of the identity equation.

KEYWORDS: cyber security data breach remote workforce risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jackie Brinkerhoff is Senior Director of Product Marketing at SailPoint.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Most Countries without Cybersecurity Strategy

    SMBs increasingly have to ‘do more with less’ when it comes to cybersecurity

    See More
  • cyber software freepik

    When it comes to cyber risk, company size doesn't matter

    See More
  • Increase in Cybercrime Demands Fresh Attention to Employee Onboarding and Training

    When It Comes to Employee Security Awareness Training - Should You be Phishing or Teaching?

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing