A Modern Approach to IGA: Securing Remote Work and Supporting Zero Trust Initiatives
ESG Research: Changing IT Landscape Drives Identity Governance Priority
New research from Enterprise Strategy Group (ESG) shows modern enterprises are responding to a heightened cyber threat by moving identity governance and administration (IGA) to the forefront of their cybersecurity strategy.
The Vulnerable Identity
The surge in work-from-home arrangements, which are widely viewed as persisting well past the current pandemic, and increased reliance on public cloud services have stretched traditional network boundaries and made enterprises more vulnerable to identity-related cyber threats.
While assuring security has become even more critical, ESG finds 72% of respondents reported managing identities and controlling access to a wide range of applications has become more difficult.
The Move to Zero Trust
To counter ramped-up cyber threats, enterprises are increasingly moving to a zero trust approach to identity and access management - access requestors are, by default, untrustworthy until verified. But IT execs must balance achieving that level of security with ensuring ease of use and maintaining employee productivity. And they must do it within the constraints of existing IT budget and headcount.
To achieve this balance, 81% of survey respondents identified IGA as a key element of their strategy.
IGA - a Strategic Imperative
The core IGA capabilities, scoping user roles, assuring segregation of duties, reviewing permissions and approval workflows, and continuous monitoring and authentication, are central to a zero trust approach.
As a result, forward-thinking enterprises place IGA alongside other cybersecurity controls as a strategic necessity. In fact, 86% of respondents rate IGA as a top-five control, and organizations with a mature digital transformation strategy view IGA among the top three.
Attend the Webinar
Get the details of ESG’s research in a live webinar on April 22 where Rod Simmons, Omada VP of Product Strategy, will discuss:
- The expanding threat landscape resulting from credential misuse
- What that risk means for your business
- The operational challenges you face - from shadow IT to cloud permissions
- Why there is a new preference for cloud-based IGA solutions