Serg Nvns - Fotolia

IT security leaders set to maintain or increase IAM spending

Senior IT decision-makers understand the need for identity and access management (IAM) systems to meet the challenges and opportunities of the digital age

Most European IT security leaders plan to maintain or increase spending on identity and access management (IAM), a survey has revealed.

The study report polled senior IT and security executives at 200 businesses across Europe, including the UK, in March 2016. It was conducted by market research and strategy company Pierre Audoin Consultants (PAC) in collaboration with global analyst firm KuppingerCole.

The results showed a significant awareness among senior IT decision-makers of the need for IAM systems that function securely while fulfilling the challenges and opportunities of the digital age.

IAM was seen as key to meeting the security challenges of digital transformation, with 93% pledging to maintain or increase spending on IAM in the next three years.

“It was surprising to see just how much senior IT security leaders understand about digital transformation,” said Paul Fisher, research director at PAC.

“This study reveals they are a lot less siloed and a lot more enlightened than previously thought.”

The study showed that European CIOs, CISOs and IT security managers are looking at consumer identities, improving customer experience and operational efficiencies as part of their planning, but believe digital transformation can only achieve its benefits if security is improved

“The fact that IT security leaders are thinking about consumer identities shows they are thinking outside of the security box. It also shows they are seeing it as a real issue and it is  good to see that some suppliers are beginning to think the same way,” said Fisher.

Read more about identity and access management (IAM)

Lack of awareness a serious risk

He said the public sector could lead the way regarding consumer identities, citing the UK Government Digital Service’s identity assurance service Verify.

When questioned on the primary goals of their digital transformation strategies, 48% of respondents said threat- or breach-mitigation was very important.

This was placed just higher than improving customer experience or driving costs savings and efficiencies, which were both expected to be digital enterprise priorities for the businesses surveyed.

However, the report said the lack of security awareness among employees could prove a serious risk as businesses transform and embrace opportunities provided by the internet of things (IoT).

In the digital age, the report said the insider threat will need to be managed ever more securely, with 46% of respondents indicating that the lack of training or understanding of IAM policies or processes would be the main cause of the next IAM-related breach.

Meanwhile, shadow IT is emerging as a serious threat to creating a secure IAM system as companies digitally transform, with 43% saying it was challenging; and 22% very challenging.

Identity and digital transformation

The study – sponsored by KPMG, Computacenter, SailPoint, CyberArk and VMware – also showed that 65% of respondents see consumer identities and applications as an important factor in their next IAM investment; 57% are considering a managed security services provider (MSSP) for their next IAM investment; and  77% said their organisation is already undergoing digital transformation.

“Our study has revealed that IT security managers are acutely aware that IAM solutions will need to step up to the plate if new identities from consumers, and even those of things and sensors, are to be securely managed,” said Fisher.

“There is a recognition among our sample that in the rush to digitally transform, the all-important security factors could be overlooked by other lines of the business. Identity and access management will move centre stage as the main defence against cyber-attacks in the digital age.

“Some things won’t change. Most breaches today are the result of simple mistakes by employees clicking on rogue links in emails, downloading malicious attachments, or simply not following security policies and training lessons.” 



Read more on Identity and access management products