Story image

Study: 80% of enterprises struggle to protect machine identities

Venafi announced the results of 'Securing The Enterprise With Machine Identity Protection', a June 2018 commissioned study conducted by Forrester Consulting on behalf of Venafi. 

The study focused on enterprise machine identity protection challenges and included responses from 350 senior IT security professionals.

Key findings from the study reveal that 96% of companies believe that effective protection of machine and human identities are equally important to the long-term security and viability of their companies. 

However, 80% of respondents struggle with the delivery of important machine identity protection capabilities.

Additional findings from the study include: 

Nearly half (40%) believe protecting machine identities and human identities will be equally important to their organisations over the next 12 to 24 months, while nearly as many (43%) think machine identity protection will be more important.

Seventy per cent admit they are tracking fewer than half of the most common types of machine identities found on their networks. When asked which specific machine identities they track:

  • Just 56% say cloud platform instance machine identities.
  • Only 49% say mobile device machine identities.
  • Only 49% say physical server machine identities.
  • Only 29% say SSH keys.
  • Only a quarter (25%) say machine identities of microservices and containers.

Sixty-one per cent say their biggest concern regarding poor machine identity protection management is internal data theft or loss. 

Managing user and machine identities and privileged access to business data and applications is an enormous undertaking that has serious security ramifications. 

Traditionally, the focus for identity and access management (IAM) programs has been people-centric, but recent increases in the number of machines on enterprise networks, shifts in technology and new computing capabilities have created a set of challenges that require an increased focus on protecting machine identities.

Aerohive launches guide to cloud-managed network access control
NAC for Dummies teaches the key aspects of network access control within enterprise IT networks and how you can secure all devices on the network.
Sungard AS named DRaaS leader by Forrester
It was noted for its disaster-recovery-as-a-service solution’s ability to “serve client needs at all stages of their need for business continuity.”
Gartner: The five priorities of privacy executives
The priorities highlight the need for strategic approaches to engage with shifting regulatory, technology, customer and third-party risk trends.
Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.