FB pixel

IT is just throwing digital ID security money at gaps, hoping for the best

IT is just throwing digital ID security money at gaps, hoping for the best
 

Research published by an ID management software vendor finds that 70 percent of companies surveyed pay for management tools they were not using when asked.

One Identity paid contract research firm Dimensional Research to gauge how well companies in multiple countries were using ID and access management software. The resulting report describes firms hobbled by “misguided enterprise investment in fragmented identity tools.”

Dimension surveyed 1,000 security professionals to learn that the way tools are being used – or not, in some cases – has rendered some companies “insufficient” in their efforts to protect identity data.

Effectively all companies contacted told survey takers that they have deployed more than one ID management tool. Forty-one percent of companies are using 25 or more disparate tools.  One Identity‘s target market is loosely run IT departments with heterogenous digital ID infrastructure.

Perhaps the most surprising result from the marketing report is that 70 percent of responding companies said they are paying tools that they are “not actively using.” At the same time, 90 percent of respondents reported suffering a digital ID attack in the previous 12 months.

Even if all are being used, the kind of depth of experience organizations need to use all of the tools properly likely is hard to find. Even standardized, off-the-shelf internet routers are sometimes operationally differentiated.

It is hard to find a return on investment in that kind of situation that makes the chief information officer look competent. Survey takers found that 42 percent of companies said these inefficiencies cost the bottom line $100,000, a number that likely is lower than reality.

According to Dimension, 1,007 qualified individuals completed a survey, and all had direct responsibility for security and IAM. Industries, nations and company sizes were not described further.

Article Topics

 |   |   |   | 

Latest Biometrics News

 

Face biometrics use cases outnumbered only by important considerations

With face biometrics now used regularly in many different sectors and areas of life, stakeholders are asking questions about a…

 

Biometric Update Podcast explores identification at scale using browser fingerprinting

“Browser fingerprinting is this idea that modern browsers are so complex.” So says Valentin Vasilyev, Chief Technology Officer of Fingerprint,…

 

Passkeys now pervasive but passwords persist in enterprise authentication

Passkeys are here; now about those passwords. Specifically, passkeys are now prevalent in the enterprise, the FIDO Alliance says, with…

 

Pornhub returns to UK, but only for iOS users who verify age with Apple

In the UK, “wanker” is not typically a term of endearment. However, the case may be different for Pornhub, which…

 

Europol operated ‘shadow’ IT systems without data safeguards: Report

Europol has operated secret data analysis platforms containing large amounts of personal information, such as identity documents, without the security…

 

EU pushes AI Act deadlines for high-risk systems, including biometrics

The EU has reached a provisional agreement on changes to the AI Act that postpone rules on high-risk AI systems,…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events