Professional Documents
Culture Documents
Report - RSA - Unified Identity Solutions 2023
Report - RSA - Unified Identity Solutions 2023
Report - RSA - Unified Identity Solutions 2023
com
April 2023
Introduction.
100%
more budget, more headcount, and identity solutions
more enduring support from senior
management for identity initiatives by
keeping a laser focus on value at both of CISOs and technology
the top and bottom of a balance sheet. leaders surveyed value
The bottom line shows the value of costs cost-effectiveness
avoided, like risk reduction, downsizing, over cost alone.
and so forth, while the top line shows the
value of benefits received, like revenue,
new business, renewal rates, etc.
CISOs are looking to identity to form Large cloud providers are scrambling
the foundation of security and risk today to build out product portfolios “I want a unified
management. Identity should be unified, and to integrate in a few years what
experience across all
security-centered, and integrated with organizations have spent decades fine-
Microsoft and the cloud. tuning in their own data centers. platforms.”
Unified identity The rush to be “all things IT” by these big –GLOBAL DIRECTOR OF IAM
providers creates a natural resistance in AT ONE OF THE LARGEST
More than half of CISOs reported the enterprise adoption, because large cloud INVESTMENT FIRMS IN THE
“most aggravating” aspect of identity providers will not keep up with fast- WORLD
is working with four or more identity moving business dynamics and a rapidly
vendors. Two-thirds of CISOs prefer evolving threat landscape. Moreover, large
having one or two identity providers corporations will not put all their eggs in
rather than multiple vendors. one cloud-provider basket, according to
Impact Leaders research.
While only a few CISOs (less than
10%) think that a decade from now the Large cloud providers do not focus on
2/ rds
cybersecurity market will consolidate to
a handful of big providers, like Microsoft,
security. They may take it seriously, but
that is different than making it their raison
3
Palo Alto Networks, Amazon, and Thoma d’etre. Today and for years to come, CISOs
of CISOs prefer having
Bravo, that is simply unlikely. plan to use specialized vendors to tackle
one or two identity
the biggest slices of the IT security pie.
providers rather than
Consolidation in the security industry has
multiple vendors.
been tried dozens of times over the last Identity is one of those slices that CISOs
forty years and it just does not work. want to take care of in one bite.
72% of IT executives say security is the One CISO said this when asked why they
primary factor when choosing an identity preferred a unified product portfolio from
provider. a security-focused provider: “We put security first in
all decisions, not cost or
CISOs seeking identity solutions today compliance. After all, if
“Our employees often don’t have
want a vendor partner they can count on,
smart phones at work, yet we still we are secure, we are, by
one that integrates the entire identity
infrastructure and lifecycle, and one that need high security across every part definition, compliant and
has an intense focus on security. of our identity and access footprint. cost-avoidant.”
I have high hopes for passwordless
–EXECUTIVE, FORTUNE 500
“Windows can’t be our sole security multi-factor authentication (MFA) CHIP MANUFACTURER
partner. It just doesn’t do enough in the future, but today I need a
to secure and integrate with our partner who can get identity done,
fragmented environment and get it working, and keep it secure,”
hundreds of downstream apps.”
–EXECUTIVE, FORTUNE 500 CHIP
MANUFACTURER
–CISO, $30BN CONSUMER PRODUCTS
COMPANY
72%
of IT executives say
security is the primary
factor when choosing an
identity provider.
82%
attacked and had to pay
ransoms in bitcoin or be out of
service for days or weeks while of breaches involved
restoring operations. We knew the use of stolen
for us it was just matter of time credentials, phishing,
and other human-related
until we got hit.” vulnerabilities.
92%
cloud.
1
Verizon 2022 Data Breach Investigations Report, page 8.
2
Ibid., page 7.
3
Ibid.
©2023 RSA Security LLC or its affiliates. All rights reserved. RSA and the RSA logo are registered trademarks or trademarks of RSA
Security LLC or its affiliates in the United States and other countries. All other trademarks are the property of their respective owners.
RSA believes the information in this document is accurate. The information is subject to change without notice. 04/2023 Report