Managing User Access Is Key With Hybrid Clouds
- 1 of
-
Managing User Access Is Key With Hybrid Clouds
IT leaders are tasked with giving employees and business partners remote access to critical cloud-based resources—without compromising the enterprise's security. -
Clouding Up
93% of the IT decision-makers surveyed said their companies use cloud storage for at least some sensitive data, such as customer records, passwords and financials. -
Checking In
97% of those surveyed allow employees and outsourced vendors privileged remote access. -
Farming Out
100% said they outsource at least some IT, application development and infrastructure functions. -
Fending Off
88% of the respondents said their highest priority is to prevent data breaches, with 77% focusing on securing remote access to resources. -
Cutting Back
78% said they must minimize attack surfaces that are created by allowing too many accounts with too much privilege. -
Locking Down
More than 80% said they have more control over security for applications, identity and access management, and storage and file sharing since migrating them to the cloud. -
Signing Up
39% of respondents have implemented at least one offering of Privileged Identity Management (PIM)-as-a-Service or plan to within 12 months -
Reaching Out
Of those using or planning to use PIM-as-a-Service, 94% cited the need to support numerous identities that result from having more remote and mobile users. -
Zeroing In
53% of participants prefer a single platform rather than multiple tools to manage privileged identity access.
Virtually all enterprises today have sensitive data and critical applications in the cloud. Providing employees and business partners with remote access to those resources without compromising security is a major challenge, especially as the number of users soars. Preventing a data breach and minimizing the risks created by having too many accounts with too much privilege are top priorities for IT decision-makers, according to a recent study conducted by Forrester Consulting on behalf of Centrify, an enterprise security provider. But businesses heavily reliant on the cloud can be just as secure as those with on-premises operations, the study showed. In fact, an overwhelming percentage of respondents indicated they have more control of their workloads since migrating to the cloud. They cited Privileged Identity Management (PIM)-as-a-Service as an effective way to secure access. "These hybrid IT trends are driving the need for PIM-as-a-Service solutions," says Theresa Tinston, director of product marketing for Centrify. "Adopters are not only securing privileged access, but also realizing cloud-based benefits, such as speed of implementation and reduced costs." The survey was conducted with 150 IT decision-makers in the U.S. with the title of director or higher in companies with more than 500 employees.