When it comes to identity and access management (IAM), the cloud, mobility initiatives, and app dev are driving chaos. Security risks are on the rise due to the expanded perimeter, and though IT operations shoulders a great deal of IAM responsibility, who actually owns identity and access management?
The answer isn’t clear-cut. It actually depends on a number of things, including: an organization’s maturity, its security posture, and how aggressively the company is pursuing identity and access management strategies.
In fact, based on ESG research, forty-nine percent of respondents report IT infrastructure operations bear the majority of IAM responsibilities—though other teams are having to lean in, including security, application management, developers, and mobile application management teams.
The current state of identity and access management offers an ideal opportunity for IT vendors focused on IAM strategies to talk with customers about how they can help solve their IAM challenges, improve their security posture, and help them navigate through a complex vendor landscape.
Stay tuned to learn more about the current state of IAM, and how organizations are dealing the challenges of a chaotic IAM environment.