Insights / Infographic / Securing the Identity Perimeter with Defense in Depth
July 7, 2022

Securing the Identity Perimeter with Defense in Depth

Jack Poller

Market Topics

Cybersecurity

Organizations continue to rely on user and machine identities that are susceptible to compromise, misuse, and theft. Modern, cloud-managed identity services are available, but organizations have been slow to pivot their security programs to an approach that focuses on identity orchestration and experiences. Enterprise Strategy Group surveyed IT and cybersecurity professionals responsible for identity and access management programs and solutions to gain insights into these trends.


For more information or to discuss these findings with an analyst, please contact us.

Unparalleled insights from analysts with an "insider" perspective

From strategy and product development to competitive insights and content creation, we deliver high-quality, actionable support services.