explore.radiantlogic.com Open in urlscan Pro
34.204.133.235  Public Scan

Submitted URL: https://www2.radiantlogic.com/e/31062/ardot-lb-email-Recipient-Email/wb646v/1407688809/h/l8dsQ4KUs87NiJDRvtq5fsvQzxObEp-hz1RmC...
Effective URL: https://explore.radiantlogic.com/c/GPI_Identity_Data_Management-Roadblock_or_Business_Enabler?x=jhdncc&utm_source=Pardot
Submission: On December 19 via manual from CA — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

Thumbnails Document Outline Attachments Layers

Current Outline Item


Previous

Next
Highlight All Match Case
Match Diacritics Whole Words

Color
Size
Color
Thickness
Opacity
Presentation Mode Open Print Download Current View

Go to First Page Go to Last Page

Rotate Clockwise Rotate Counterclockwise

Text Selection Tool Hand Tool

Page Scrolling Vertical Scrolling Horizontal Scrolling Wrapped Scrolling

No Spreads Odd Spreads Even Spreads

Document Properties…
Toggle Sidebar

Find
Previous

Next
of 1
Presentation Mode Open Print Download Current View

FreeText Annotation Ink Annotation

Tools
Zoom Out

Zoom In
Automatic Zoom Actual Size Page Fit Page Width 50% 75% 100% 125% 150% 200% 300%
400%

This content, which provides opinions and points of view expressed by users,
does not represent the views of Gartner; Gartner
neither endorses it nor makes any warranties about its accuracy or completeness.
© 2022 Gartner, Inc. and/or its affiliates. All rights reserved.
Source: Gartner Peer Insights, Identity Access Management survey
It is too time-intensive and costly to
manage effectively on an ongoing basis
It is of vital importance if we want to
manage our hybrid infrastructure
effectively
It is important as it impacts on our
ability to make informed security and
business-critical decisions
It isn’t a priority as it isn’t on our
leadership or board’s agenda
We know it can help enable us to make
better decisions, we just don’t know
how to manage the complexity in our
infrastructure
It is only seen as important when there
has been a headline-grabbing data
breach related to identity credentials
Identity and access management (IAM) encompasses a wide range of tools and
processes used to verify user accounts and grant access to corporate networks,
applications, and services. As the number of accounts and identities continues
to grow,
identity can become more of a roadblock than a business enabler. But, having the
right
data can turn identity into an asset, not a hindrance.
GPI and Radiant Logic surveyed 100 IT and information security leaders who are
involved
in the decision to purchase identity-related products to understand how they are
addressing today’s identity management challenges.
Data collection: June 3 - July 17, 2022 Respondents: 100 IT and InfoSec leaders
Identity Data
Management:
Roadblock or
Business Enabler?
Even with centralized or designated teams, identity
management is commonly viewed as too time-
intensive and costly to address effectively.
72% of organizations have a designated identity team to manage customer
identities.
58% have a centralized team that manages both workforce and customer identities.
Overall 98% of organizations reported using some sort of identity management
team.
What teams manage identity in your business?
We have a designated
identity team to manage
customer identities
We have a centralized
team that manages all
identities, including both
workforce and customer
We have a designated
identity team to manage
workforce identities
We do not have a
designated identity team
or individual
72%
58%
44%
2%
Other 0%
Although many rated identity management of vital importance (58%), most
respondents
(61%) reported that their business views identity management as too
time-intensive and
costly to manage effectively on an ongoing basis.
Which of the following describe how identity
management is viewed by your business?
61%
58%
47%
30%
None of these 0%, Don’t know 0%
18%
76%
The two most common ways IT leaders define an identity are, a human within your
network (76%), and a customer (75%).
How do you define an identity
for the purposes of your team?
Other 1%, Don’t know 0%
A human
from within
your network
A customer A partner or
contractor
A machine,
bot, or API
A silicon-
based device
or other entity
13%
49%
75%
41%
27%
Disparate identities are causing technical debt and
identity-related breaches, as IT leaders struggle to
address sprawl.
60% of organizations have over 21 disparate identities per user.
On average, how many disparate identities
does each user within the organization have?
17%
1-10
25%
31-40
1%
41-50
34%
21-30
23%
11-20
51 or more 0%, I have no idea; we aren’t able to get insight into this 0%
The two most common impacts of managing disparate identities cited by IT/InfoSec
leaders are increased technical debt (66%) and negative productivity and morale
(64%).
What impact has managing
these disparate identities
had on the business?
66%
Increased costs to the business
including managing technical debt
42%
Inability to make
informed data-driven
business decisions
27%
Unable to progress with
crucial digital
transformation and
legacy system upgrades
18%
Exposure to more
security threats
64%
Negative impact on workforce
productivity and morale
Poor employee, partner or
customer experience 15%,
Customer service has been
negatively impacted 4%, Other 2%
84% of organizations have experienced an identity related breach.
Has your organization experienced an identity-related breach?
5%
Yes, within the last six months
62%
Yes, between 6 and 12
months ago
5%
Not that I am aware of
11%
No, never
17%
Yes, but more than a
year ago
More than two-thirds (67%) of organizations have identity sprawl but don’t know
how to
address it.
What best describes your current ability to
manage identities across the organization?
67%
We know we have identity
sprawl across the
organization but don’t know
how to fully address it
5%
It is unmanageable and
we don’t have any
visibility into the full
scope of user identities
28%
We have good visibility and
management of identities
across our on-prem and
cloud IT infrastructure
This often falls through the gaps between siloed teams within the organization
0%,
It is too big a project for us to take on 0%, Other 0%
IT leaders are concerned about budget constraints,
employee frustration, and poor identity management
practices. Meanwhile, employees are frustrated because
they can’t access the resources they need–leading to
wasted time, reduced productivity, and depleted support.
85% of IT/Infosec leaders are concerned about users logging into personal
applications
with their work credentials and have had little success preventing this.
Are you concerned about users accessing/logging into
personal applications with their work-based credentials?
11%
Highly concerned –
everyone reuses
credentials, and we
know our organization
is being opened up to
potential threats
5%
Not concerned – we have
appropriate measures in
place to ensure that the
organization is protected
74%
Concerned – we have tried to prevent
this but with nominal success
10%
Neutral – we know it
happens but don’t see
it as a risk
Don’t know 0%
The most common user complaint from managing identity is poor integration with
new
tools and applications (71%), and getting help for these issues requires time
and
resources from support.
What have been the most common complaints from users when
it comes to managing their identity within the organization?
Poor integration with new
tools and applications
They have to speak to
multiple different people
depending on which business
application they are using to
find out how to fix any issues
Lack of real-time technical
support when they have
issues
They are frustrated by having
to remember multiple logins
for different applications
71%
45%
42%
39%
Being restricted in their
ability to quickly access
information in order to do
their jobs, often then finding
a workaround
26%
There haven’t been many complaints 8%, Other 2%, Don’t know 0%
Not having budget allocated
to progress with identity-
based projects
Continued frustration from
employees that we cannot fix
Not being able to support
business growth due to
outdated legacy systems
Inability to protect the
organization from security
threats
71%
46%
36%
35%
Unsustainability of managing
complexity across all of the
different systems, devices
and machines
20%
Delivering poor customer
service and potentially
churning customers
12%
Questions of citizen privacy loom large in the future.
At the same time, identity intelligence is poised to
add additional layers of security and enhance
decision making.
Nearly half (46%) of IT leaders have privacy concerns with the rise of
citizen-based
digital identity initiatives. 36% don’t think digital identity cards will catch
on or be
widely implemented.
What best characterizes your thoughts on the rise
of citizen-based digital identity initiatives, such as
countries implementing digital identity cards?
46%
I have privacy concerns
about these initiatives and
how much data will be
shared, managed and
accessed by external parties
36%
I don’t think it will
catch on or be
widely implemented
by all nations
11%
It will continue to
blur the lines
between
professional and
personal identities
I don’t have any concerns 3%, Other 0%
The pandemic and rise of digital vaccine passes have fuelled the take-up of this
2%,
I think it is a positive step to having a more unified identification process
across countries 1%,
I’d want to be able to opt in or opt out of any scheme 1%, I haven’t given it
much thought 3%, Other 0%
84% of respondents said intelligence gathered from identity profiles is most
commonly
used to understand user privilege and access decisions.
How do you use the intelligence gathered from the
identity profiles to inform security and policy decisions?
84%
Understand and have
visibility into user
privilege/access so that
we can ensure all users
have appropriate access
47%
Ensure that we
remain compliant
with industry
regulations and
mandates
46%
Detect any unusual
behavior or logins
so we can look into
any anomalies
immediately
44%
Discover context
and connections
that were
previously
unseen by us
28%
We only have insight
into some
intelligence, so we
make decisions with
limited visibility
Not at all - we do not gather or use intelligence from identity profiles 0%,
Other 0%, Don’t know 0%
After years of inorganic growth, piecemeal identity solutions, and more
recently, a loss of
control due to unplanned remote work, identity sprawl is a reality for most
modern
enterprises. This sprawl leads to tremendous technical debt, reduced
productivity, and
poor decision-making capabilities. Add in budget constraints, and identity and
access
management has become a roadblock for many organizations.
Radiant Logic, the enterprise Identity Data Fabric company, helps organizations
combat
complexity and improve security by making identity data easy to use, manage, and
protect. The RadiantOne Platform turns identity data into a strategic asset,
enabling
organizations to improve decision making, accelerate innovation, and minimize
risk.
Built to overcome identity sprawl and technical debt, RadiantOne unifies
identity
information from disparate sources across legacy and cloud infrastructures to
create an
authoritative data pipeline that drives: Zero Trust Architecture; merger and
acquisition
integrations or divestitures; access, authorization, governance & administration
processes; cloud migration initiatives; customer identity and access management;
directory modernization efforts; and more. It’s a radically simple approach.
Learn more at http://www.radiantlogic.com/
5,001 - 10,000
employees
10,001+
employees
Respondent Breakdown
North America 65%
REGION
EMEA 35%
COMPANY SIZE
VP
C-Suite
TITLE
Director
32% 32%
36%
56%
44%
Moving forward, IT/InfoSec leaders face continued employee frustration and
productivity
challenges, yet they must contend with on-going budget constraints.
What identity and access related risks are
you most concerned about moving forward?

More Information Less Information
Close

Enter the password to open this PDF file.

Cancel OK
File name:

-

File size:

-


Title:

-

Author:

-

Subject:

-

Keywords:

-

Creation Date:

-

Modification Date:

-

Creator:

-


PDF Producer:

-

PDF Version:

-

Page Count:

-

Page Size:

-


Fast Web View:

-

Close
Preparing document for printing…
0%
Cancel

Next 
Next 

The Total Economic Impact™ of Radiant Logic
Read the Forrester TEI report to see how your organization can achieve
meaningful business value by reducing risk, reducing costs, improving
organizational efficiency, and achieving faster time-to-value.
LinkedIn LinkTwitter LinkFacebook LinkEmail Link
pdf:What’s the Role of Identity in Your Enterprise?
pdf:Transform Identity from Roadblock to Business Enabler
pdf:Identity Sprawl and the Toll of Enterprise Identity Debt
pdf:Providing Secure Access to Corporate Applications and Single Sign-On For All
pdf:Identity Data Management Survey: Roadblock or Business Enabler?
pdf:The Total Economic Impact™ of Radiant Logic