sb-nz logo
Story image

Study: 80% of enterprises struggle to protect machine identities

Venafi announced the results of 'Securing The Enterprise With Machine Identity Protection', a June 2018 commissioned study conducted by Forrester Consulting on behalf of Venafi. 

The study focused on enterprise machine identity protection challenges and included responses from 350 senior IT security professionals.

Key findings from the study reveal that 96% of companies believe that effective protection of machine and human identities are equally important to the long-term security and viability of their companies. 

However, 80% of respondents struggle with the delivery of important machine identity protection capabilities.

Additional findings from the study include: 

Nearly half (40%) believe protecting machine identities and human identities will be equally important to their organisations over the next 12 to 24 months, while nearly as many (43%) think machine identity protection will be more important.

Seventy per cent admit they are tracking fewer than half of the most common types of machine identities found on their networks. When asked which specific machine identities they track:

  • Just 56% say cloud platform instance machine identities.
  • Only 49% say mobile device machine identities.
  • Only 49% say physical server machine identities.
  • Only 29% say SSH keys.
  • Only a quarter (25%) say machine identities of microservices and containers.

Sixty-one per cent say their biggest concern regarding poor machine identity protection management is internal data theft or loss. 

Managing user and machine identities and privileged access to business data and applications is an enormous undertaking that has serious security ramifications. 

Traditionally, the focus for identity and access management (IAM) programs has been people-centric, but recent increases in the number of machines on enterprise networks, shifts in technology and new computing capabilities have created a set of challenges that require an increased focus on protecting machine identities.

Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More
Story image
IT leaders fear increase risk of cyber attacks while working from home
More than 80% of IT leaders believe their company is at a greater risk of cyber attacks when their staff are working from home, according to new research. More
Story image
Gartner: By 2023, 65% of the world will have personal data covered under modern privacy regulations
“Security and risk management (SRM) leaders need to help their organisation adapt their personal data handling practices without exposing the business to loss."More
Download image
Equinix study: Firms turn to NFV to support distributed networks
Decision-makers looking for a solution that virtualises a wide range of network functions should evaluate NFV, study finds.More