Conversion Hackers
Fealse: Tech News
50% of Orgs Rely on Email to Manage Security
  • Security

50% of Orgs Rely on Email to Manage Security

  • May 16, 2022
  • admin
Total
0
Shares
0
0
0


How do companies control application permissions and entitlements? According to a survey by Internet security and governance company Clear Skye, midsize and large companies turn to their IT service management (ITSM)/workforce management platform, while small companies are more inclined to use email.

The “2022 Identity Management Survey” polled a total of 514 respondents from a range of industries and organization sizes. Large companies are the most likely to place ITSM/workforce at the top of the list for controlling permissions, at 55%, while 51% of respondents from midsize companies did. The support dropped sharply for small companies, where only 38% reported using such software.

Small companies made up the difference by relying more heavily on email (57%) than either large (43%) or midsize (47%) organizations. Small and midsize companies were almost equally likely to use Excel or other spreadsheets to control permissions (35% and 34%, respectively), while large companies were less likely to use spreadsheets (27%).

Prepackaged identity and access management (IAM)/identity governance and administration (IGA) saw less than one-third penetration among large and midsize businesses (28% each), while small businesses were even less invested (25%).

And “invested” might be on the nose. Small businesses reported that cost was their top concern for permission management, while IT workers listed user experience, cost, and time to fulfillment as their top three challenges. After all, a company has to have an email system, and most also use spreadsheets already, so why introduce an expensive new system when you can rig an existing system to do mostly the same function?

Interestingly, respondents who had IT-specific job functions cited email and ITSM/workforce management as their top options for managing permissions and entitlements — 54% for each. Excel and other spreadsheets came in at a distant third place, with 34% of IT workers mentioning them. IAM/IGA tools beat out only “I don’t know” (10%) and “other” (1%) in IT’s estimation, with less than a third (29%) of IT workers citing that category. Non-IT workers at least have a good understanding of what their organizations use to control access, since their answers closely approached their IT colleagues.’ Only “I don’t know” was higher (10%), which makes sense.

Download the full report from Clear Skye.

Total
0
Shares
Share 0
Tweet 0
Pin it 0
admin

Previous Article
The new Asus RTX 3080 Noctua Edition might the quietest high-end card yet
  • How To

The new Asus RTX 3080 Noctua Edition might the quietest high-end card yet

  • May 16, 2022
  • admin
View Post
Next Article
IT admin gets seven years in prison for nuking company servers
  • Apps

IT admin gets seven years in prison for nuking company servers

  • May 16, 2022
  • admin
View Post
You May Also Like
Learn NIST Inside Out With 21 Hours of Training @ 86% OFF
View Post
  • Security

Learn NIST Inside Out With 21 Hours of Training @ 86% OFF

  • admin
  • June 25, 2022
Threat Intelligence Services Are Universally Valued by IT Staff
View Post
  • Security

Threat Intelligence Services Are Universally Valued by IT Staff

  • admin
  • June 24, 2022
Astrix Security Emerges From Stealth With $15M Seed Round
View Post
  • Security

Why We’re Getting Vulnerability Management Wrong

  • admin
  • June 24, 2022
CISA, Australia, Canada, New Zealand, & UK Issue Joint Advisory on Russian Cyber Threats
View Post
  • Security

APT Groups Swarming on VMware Servers with Log4Shell

  • admin
  • June 24, 2022
View Post
  • Security

Only 3% of Open Source Software Bugs Are Actually Attackable, Researchers Say

  • admin
  • June 24, 2022
SaaS in the Enterprise: The Good, the Bad, and the Unknown
View Post
  • Security

7 Steps to Stronger SaaS Security

  • admin
  • June 24, 2022
Instagram’s new age verification tool – Week in security with Tony Anscombe
View Post
  • Security

Instagram’s new age verification tool – Week in security with Tony Anscombe

  • admin
  • June 24, 2022
Mitel VoIP Zero-Day
View Post
  • Security

Hackers Exploit Mitel VoIP Zero-Day Bug to Deploy Ransomware

  • admin
  • June 24, 2022

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories
  • Apps
  • Games
  • How To
  • News
  • Photography
  • Reviews
  • Security

Input your search keywords and press Enter.