Download Publication
Who it's for:
The State of Multi-Cloud Identity Survey
Release Date: 10/29/2024
- The state of identity architecture in the enterprise
- Identity resiliency plans
- Gaps in identity analytics capabilities
- The current approach to identity governance for applications
- 75% of organizations now manage two or more identity providers, with 11% relying on five or more.
- 57% of organizations report moderate/high difficulty when onboarding on-premises apps to a cloud identity provider.
- When deploying advanced authentication for applications, the most common barrier is incompatibility with non-standard, legacy applications.
- Organizations place a high value on visibility within their IAM environments. However, 40% of organizations report inadequate visibility into user behaviors.
- Looking ahead to 2025, improving identity analytics and visibility is a top priority for 53% of organizations.
- 69% of organizations engage in disaster recovery planning, 66% have implemented automated failover systems, and 65% have configured their systems for high availability.
- Only 38% of organizations report having fully implemented measures to ensure continuous availability of identity services. A troubling 6% of organizations admit to having nothing in place at all.
- Organizations are aware of the dual necessity of both preventing downtime and having robust recovery plans in place. Yet, only 28% indicated that they could implement recovery measures within the hour.
Download this Resource
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn moreFor those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more