Identity security is proving more important for zero trust than ever


For almost all enterprise IT and security decision-makers, endpoint security or device trust and identity management are essential to a robust Zero Trust (opens in new tab) strategy. However, only a handful of organizations are actually putting an effort in this direction, leaving most firms at risk of destructive cyberattacks.
This is according to “The Holistic Identity Security Maturity Model: Raising the Bar for Cyber Resilience” report, recently published by identity security experts CyberArk.
After polling 1,500 IT and security decision-makers around the world, that operate in a multi-cloud environment, the company found that for nearly all (92%) of the respondents, device trust and identity management are key for Zero Trust. Furthermore, roughly two-thirds (65%) of the respondents believe the ability to correlate data is critical for effectively securing endpoints.
Mature and holistic strategies
But most companies have a long way to go in that respect. Less than a tenth (9%) of organizations were identified as having “mature and holistic” Identity Security strategies. For CyberArk, these firms are “transformative” and have a “well-rounded focus on implementing Identity Security tools”. They are also “inherently agile” and display a “fail fast, learn faster” characteristic, even when faced with a successfully pulled-off cyberattack.
CyberArk also hints that it’s going to take quite some time before things turn for the better, as 42% of all respondents’ Identity Security programs are in the early stages of maturity and lack foundational tools and integrations for a quick mitigation of identity-related risk.
“An expanding identity attack surface, IT complexity and several organizational roadblocks contribute to this widespread Identity Security deficit,” the researchers concluded.
There also seems to be a perception gap between C-level executives and other staff (technical decision-makers and practitioners) when it comes to Identity Security-related decisions. While 69% of the C-suite believe they’re making the right calls, just 52% of other staff would agree.
For almost all enterprise IT and security decision-makers, endpoint security or device trust and identity management are essential to a robust Zero Trust (opens in new tab) strategy. However, only a handful of organizations are actually putting an effort in this direction, leaving most firms at risk of destructive cyberattacks.…
Recent Posts
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010