explore.radiantlogic.com
Open in
urlscan Pro
34.204.133.235
Public Scan
Submitted URL: https://www2.radiantlogic.com/e/31062/ardot-lb-email-Recipient-Email/wb646v/1407688809/h/l8dsQ4KUs87NiJDRvtq5fsvQzxObEp-hz1RmC...
Effective URL: https://explore.radiantlogic.com/c/GPI_Identity_Data_Management-Roadblock_or_Business_Enabler?x=jhdncc&utm_source=Pardot
Submission: On December 19 via manual from CA — Scanned from CA
Effective URL: https://explore.radiantlogic.com/c/GPI_Identity_Data_Management-Roadblock_or_Business_Enabler?x=jhdncc&utm_source=Pardot
Submission: On December 19 via manual from CA — Scanned from CA
Form analysis
0 forms found in the DOMText Content
Thumbnails Document Outline Attachments Layers Current Outline Item Previous Next Highlight All Match Case Match Diacritics Whole Words Color Size Color Thickness Opacity Presentation Mode Open Print Download Current View Go to First Page Go to Last Page Rotate Clockwise Rotate Counterclockwise Text Selection Tool Hand Tool Page Scrolling Vertical Scrolling Horizontal Scrolling Wrapped Scrolling No Spreads Odd Spreads Even Spreads Document Properties… Toggle Sidebar Find Previous Next of 1 Presentation Mode Open Print Download Current View FreeText Annotation Ink Annotation Tools Zoom Out Zoom In Automatic Zoom Actual Size Page Fit Page Width 50% 75% 100% 125% 150% 200% 300% 400% This content, which provides opinions and points of view expressed by users, does not represent the views of Gartner; Gartner neither endorses it nor makes any warranties about its accuracy or completeness. © 2022 Gartner, Inc. and/or its affiliates. All rights reserved. Source: Gartner Peer Insights, Identity Access Management survey It is too time-intensive and costly to manage effectively on an ongoing basis It is of vital importance if we want to manage our hybrid infrastructure effectively It is important as it impacts on our ability to make informed security and business-critical decisions It isn’t a priority as it isn’t on our leadership or board’s agenda We know it can help enable us to make better decisions, we just don’t know how to manage the complexity in our infrastructure It is only seen as important when there has been a headline-grabbing data breach related to identity credentials Identity and access management (IAM) encompasses a wide range of tools and processes used to verify user accounts and grant access to corporate networks, applications, and services. As the number of accounts and identities continues to grow, identity can become more of a roadblock than a business enabler. But, having the right data can turn identity into an asset, not a hindrance. GPI and Radiant Logic surveyed 100 IT and information security leaders who are involved in the decision to purchase identity-related products to understand how they are addressing today’s identity management challenges. Data collection: June 3 - July 17, 2022 Respondents: 100 IT and InfoSec leaders Identity Data Management: Roadblock or Business Enabler? Even with centralized or designated teams, identity management is commonly viewed as too time- intensive and costly to address effectively. 72% of organizations have a designated identity team to manage customer identities. 58% have a centralized team that manages both workforce and customer identities. Overall 98% of organizations reported using some sort of identity management team. What teams manage identity in your business? We have a designated identity team to manage customer identities We have a centralized team that manages all identities, including both workforce and customer We have a designated identity team to manage workforce identities We do not have a designated identity team or individual 72% 58% 44% 2% Other 0% Although many rated identity management of vital importance (58%), most respondents (61%) reported that their business views identity management as too time-intensive and costly to manage effectively on an ongoing basis. Which of the following describe how identity management is viewed by your business? 61% 58% 47% 30% None of these 0%, Don’t know 0% 18% 76% The two most common ways IT leaders define an identity are, a human within your network (76%), and a customer (75%). How do you define an identity for the purposes of your team? Other 1%, Don’t know 0% A human from within your network A customer A partner or contractor A machine, bot, or API A silicon- based device or other entity 13% 49% 75% 41% 27% Disparate identities are causing technical debt and identity-related breaches, as IT leaders struggle to address sprawl. 60% of organizations have over 21 disparate identities per user. On average, how many disparate identities does each user within the organization have? 17% 1-10 25% 31-40 1% 41-50 34% 21-30 23% 11-20 51 or more 0%, I have no idea; we aren’t able to get insight into this 0% The two most common impacts of managing disparate identities cited by IT/InfoSec leaders are increased technical debt (66%) and negative productivity and morale (64%). What impact has managing these disparate identities had on the business? 66% Increased costs to the business including managing technical debt 42% Inability to make informed data-driven business decisions 27% Unable to progress with crucial digital transformation and legacy system upgrades 18% Exposure to more security threats 64% Negative impact on workforce productivity and morale Poor employee, partner or customer experience 15%, Customer service has been negatively impacted 4%, Other 2% 84% of organizations have experienced an identity related breach. Has your organization experienced an identity-related breach? 5% Yes, within the last six months 62% Yes, between 6 and 12 months ago 5% Not that I am aware of 11% No, never 17% Yes, but more than a year ago More than two-thirds (67%) of organizations have identity sprawl but don’t know how to address it. What best describes your current ability to manage identities across the organization? 67% We know we have identity sprawl across the organization but don’t know how to fully address it 5% It is unmanageable and we don’t have any visibility into the full scope of user identities 28% We have good visibility and management of identities across our on-prem and cloud IT infrastructure This often falls through the gaps between siloed teams within the organization 0%, It is too big a project for us to take on 0%, Other 0% IT leaders are concerned about budget constraints, employee frustration, and poor identity management practices. Meanwhile, employees are frustrated because they can’t access the resources they need–leading to wasted time, reduced productivity, and depleted support. 85% of IT/Infosec leaders are concerned about users logging into personal applications with their work credentials and have had little success preventing this. Are you concerned about users accessing/logging into personal applications with their work-based credentials? 11% Highly concerned – everyone reuses credentials, and we know our organization is being opened up to potential threats 5% Not concerned – we have appropriate measures in place to ensure that the organization is protected 74% Concerned – we have tried to prevent this but with nominal success 10% Neutral – we know it happens but don’t see it as a risk Don’t know 0% The most common user complaint from managing identity is poor integration with new tools and applications (71%), and getting help for these issues requires time and resources from support. What have been the most common complaints from users when it comes to managing their identity within the organization? Poor integration with new tools and applications They have to speak to multiple different people depending on which business application they are using to find out how to fix any issues Lack of real-time technical support when they have issues They are frustrated by having to remember multiple logins for different applications 71% 45% 42% 39% Being restricted in their ability to quickly access information in order to do their jobs, often then finding a workaround 26% There haven’t been many complaints 8%, Other 2%, Don’t know 0% Not having budget allocated to progress with identity- based projects Continued frustration from employees that we cannot fix Not being able to support business growth due to outdated legacy systems Inability to protect the organization from security threats 71% 46% 36% 35% Unsustainability of managing complexity across all of the different systems, devices and machines 20% Delivering poor customer service and potentially churning customers 12% Questions of citizen privacy loom large in the future. At the same time, identity intelligence is poised to add additional layers of security and enhance decision making. Nearly half (46%) of IT leaders have privacy concerns with the rise of citizen-based digital identity initiatives. 36% don’t think digital identity cards will catch on or be widely implemented. What best characterizes your thoughts on the rise of citizen-based digital identity initiatives, such as countries implementing digital identity cards? 46% I have privacy concerns about these initiatives and how much data will be shared, managed and accessed by external parties 36% I don’t think it will catch on or be widely implemented by all nations 11% It will continue to blur the lines between professional and personal identities I don’t have any concerns 3%, Other 0% The pandemic and rise of digital vaccine passes have fuelled the take-up of this 2%, I think it is a positive step to having a more unified identification process across countries 1%, I’d want to be able to opt in or opt out of any scheme 1%, I haven’t given it much thought 3%, Other 0% 84% of respondents said intelligence gathered from identity profiles is most commonly used to understand user privilege and access decisions. How do you use the intelligence gathered from the identity profiles to inform security and policy decisions? 84% Understand and have visibility into user privilege/access so that we can ensure all users have appropriate access 47% Ensure that we remain compliant with industry regulations and mandates 46% Detect any unusual behavior or logins so we can look into any anomalies immediately 44% Discover context and connections that were previously unseen by us 28% We only have insight into some intelligence, so we make decisions with limited visibility Not at all - we do not gather or use intelligence from identity profiles 0%, Other 0%, Don’t know 0% After years of inorganic growth, piecemeal identity solutions, and more recently, a loss of control due to unplanned remote work, identity sprawl is a reality for most modern enterprises. This sprawl leads to tremendous technical debt, reduced productivity, and poor decision-making capabilities. Add in budget constraints, and identity and access management has become a roadblock for many organizations. Radiant Logic, the enterprise Identity Data Fabric company, helps organizations combat complexity and improve security by making identity data easy to use, manage, and protect. The RadiantOne Platform turns identity data into a strategic asset, enabling organizations to improve decision making, accelerate innovation, and minimize risk. Built to overcome identity sprawl and technical debt, RadiantOne unifies identity information from disparate sources across legacy and cloud infrastructures to create an authoritative data pipeline that drives: Zero Trust Architecture; merger and acquisition integrations or divestitures; access, authorization, governance & administration processes; cloud migration initiatives; customer identity and access management; directory modernization efforts; and more. It’s a radically simple approach. Learn more at http://www.radiantlogic.com/ 5,001 - 10,000 employees 10,001+ employees Respondent Breakdown North America 65% REGION EMEA 35% COMPANY SIZE VP C-Suite TITLE Director 32% 32% 36% 56% 44% Moving forward, IT/InfoSec leaders face continued employee frustration and productivity challenges, yet they must contend with on-going budget constraints. What identity and access related risks are you most concerned about moving forward? More Information Less Information Close Enter the password to open this PDF file. Cancel OK File name: - File size: - Title: - Author: - Subject: - Keywords: - Creation Date: - Modification Date: - Creator: - PDF Producer: - PDF Version: - Page Count: - Page Size: - Fast Web View: - Close Preparing document for printing… 0% Cancel Next Next The Total Economic Impact™ of Radiant Logic Read the Forrester TEI report to see how your organization can achieve meaningful business value by reducing risk, reducing costs, improving organizational efficiency, and achieving faster time-to-value. LinkedIn LinkTwitter LinkFacebook LinkEmail Link pdf:What’s the Role of Identity in Your Enterprise? pdf:Transform Identity from Roadblock to Business Enabler pdf:Identity Sprawl and the Toll of Enterprise Identity Debt pdf:Providing Secure Access to Corporate Applications and Single Sign-On For All pdf:Identity Data Management Survey: Roadblock or Business Enabler? pdf:The Total Economic Impact™ of Radiant Logic