• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Latest News

New Research: Low IAM Program Maturity is Leaving Companies Vulnerable to Rising Identity-Related Security Incidents

June 16, 2022 TechDecisions Staff

Ponemon Institute Finds Only 16% of Enterprises Have Fully Mature Programs While 56% Average Three Identity-Related Data Breaches in Last Two Years

LOS ANGELES–(BUSINESS WIRE)–Saviynt, a leading provider of intelligent identity governance solutions and Ponemon Institute today released the inaugural State of Enterprise Identity research report. The findings emphasize the modern identity security challenges that organizations face in the digital era and underscore the importance of comprehensive identity and access management (IAM) strategies to dramatically reduce security risks that often lead to costly data breaches, cyber attacks and regulatory compliance missteps.

According to research findings, only 16% of respondents have a fully mature IAM strategy in place, which is characterized by fully operating programs, skilled workers, and C-level and board executive awareness. The remainder (84%) are currently dealing with inadequate budgets, programs stuck in a planning phase, and lack of senior-level awareness.

As IAM programs fail to get off the ground, the number of digital identities continues to skyrocket, creating complex enterprise environments that require new strategies, investments, and technology to close security gaps. In fact, over the past two years, more than half (56%) of respondents claim their business had an average of three data breaches or other access-related security incidents. Further, 52% of these respondents claim the breach was due to lack of comprehensive identity controls or policies.

“We’ve found that most enterprise IAM programs have not achieved maturity, leaving companies struggling to reduce identity and access related risks,” said Jeff Margolies, Chief Strategy Officer, Saviynt. “Our research findings should serve as a wake-up call to C-level executives and security leaders: the absence of a modern IAM program fuels the risk of rising identity and access-related attacks and their financial consequences.”

Limited Visibility and Inadequate Controls Have Become the New Normal

Enterprise-wide visibility is critical to reducing risks in privileged user access and yet today’s complex enterprise ecosystems only further impede transparency. According to findings, just over a third of respondents (35%) are confident that they can determine privileged users are compliant with policies. That same percentage (only 35%) have high confidence in the effectiveness of current security controls preventing internal threats involving the use of privileged credentials. The number one reason for lack of confidence in achieving visibility of privileged user access is confirmed by 61% of respondents, citing that they can’t keep up with the changes occurring to their IT resources.

Beyond the lack of confidence in user access controls, there’s also compliance and regulation issues to address. Data shows that almost half of respondents (46%) say their business failed to comply with regulations because of access-related issues. Beyond lawsuits and fines, many victims have suffered from loss of revenue, customers, and reputation, but almost two-thirds of respondents (64%) say IT system downtime was the biggest consequence of compliance failures.

“While these numbers certainly raise concerns, our research also shows that many organizations are recognizing the benefits of a converged identity platform such as Saviynt, which combines multiple identity management capabilities into a single cloud solution to unify controls, improve visibility, and reduce risk,” continued Margolies. In fact, 71% of respondents are actively considering, or plan to adopt, converged identity governance & administration (IGA) and privileged access management (PAM) solutions to reduce costs and provide frictionless access to enterprise resources.

Additional key report findings:

  • Automation can ease the identity management burden

    • 56% claimed that granting and enforcing privileged user access rights required too much staff to monitor and control
    • 51% are unable to keep pace with the number of access change requests
  • The power of the cloud (and IAM)

    • 52% say their organizations’ cloud transformation program is already integrated with their IAM strategy
    • 51% have seen an improvement in their IAM effectiveness
  • Remote & hybrid workers still present security risks

    • Only 28% of respondents say their organizations are determining if remote workers are securely accessing the network
    • 37% report the number one step to secure the hybrid, remote workforce is screening new employees

The study was conducted by Ponemon Institute on behalf of Saviynt and includes responses from more than 1,000 IT and IT security practitioners in the United States (627) and EMEA (416). These participants are knowledgeable about their organizations’ programs and solutions used to mitigate cybersecurity, identity & access and compliance risks.

View the complete findings and download the 2022 State of Enterprise Identity Report today.

You can also join Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Jeff Margolies, Chief Strategy Officer at Saviynt for a live webinar July 14th at 11 am PT to unpack the findings and get expert strategies to inform your IAM strategy moving forward.

About Saviynt

Saviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity governance (IGA), granular application access, cloud security, and privileged access to secure the entire business ecosystem and provide a frictionless user experience. For more information, please visit saviynt.com.

Contacts

PR:
Nina Korfias

fama PR for Saviynt

[email protected]

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Related Content:

  • Virgin Media O2 Partners with VMware to Complete…
  • SEON Expands Advanced Digital Device Fingerprinting to Counter…
  • Akumina Announces 86% Year-over-Year SaaS Bookings Growth as…
  • Skykit Survey: Sharing Data Dashboards Broadly with Employees…

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.