ESG Infographic: The 5 Pillars of Ransomware Preparedness

Abstract:

The ransomware threat is a top-of-mind issue for many organizations, but few feel totally prepared for an attack. IT organizations are building their own processes to respond, but many are confused about the scope of what is to be included and even who is responsible for the implementation. In order to establish a framework for modern ransomware preparedness, ESG surveyed IT and cybersecurity professionals personally involved with protecting against ransomware attacks and developed the 5 pillars of ransomware preparedness.

Topics: Identity and Access Management Ransomware

ESG Infographic: Securing the Identity Perimeter with Defense in Depth

Abstract:

Organizations continue to rely on user and machine identities that are susceptible to compromise, misuse, and theft. Modern, cloud-managed identity services are available, but organizations have been slow to pivot their security programs to an approach that focuses on identity orchestration and experiences. ESG surveyed IT and cybersecurity professionals responsible for identity and access management programs and solutions to gain insights into these trends.

Topics: Data Protection Identity and Access Management

ESG Complete Survey Results: Securing the Identity Perimeter with Defense in Depth

Abstract:

ESG conducted a comprehensive online survey of IT and cybersecurity professionals from private- and public-sector organizations in North America (United States and Canada) between December 14, 2021 and December 28, 2021. To qualify for this survey, respondents were required to be IT and cybersecurity professionals focusing on identity and access management programs, projects, processes, solutions/platforms, and services.

This Complete Survey Results presentation focuses how organizations are currently monitoring and protecting identities in terms of the breadth of identity products, platforms, and technologies supporting current business operations, as well as how that is expected to evolve over time.

Topics: Cybersecurity Identity and Access Management

ESG Research Report: Securing the Identity Perimeter with Defense in Depth

Abstract:

The core tenet of a zero trust strategy is least-privilege access. Yet, organizations continue to rely on user and machine identities that are susceptible to compromise, abuse/misuse, and theft. Risk is compounded by over-permissive, static access rights that provide little to no visibility into who and what is using access and how. Vaguer is how identities are being/should be monitored and protected. Availability of modern, cloud-managed identity services is widespread. Yet organizations have been slow to pivot their security programs from traditional endpoint, network, and SecOps to an approach that focuses on identity orchestration and experiences, which is dynamic and distributed. Where there are no perimeters, a multitude of identity verification services and managed identity services exist.

In order to gain insights into these trends, ESG surveyed 488 IT and cybersecurity professionals personally responsible for identity and access management programs, projects, processes, solutions/platforms, and services at large midmarket (500 to 999 employees) and enterprise (1,000 or more employees) organizations in North America (US and Canada).

Topics: Cybersecurity Identity and Access Management