Identity & Access Management Identity and Access Management (IAM) Is a Strategic Component to Cyber Security Architecture IAM Professionals Will Continue to Demand More IAM Buyer Types By Solution Drivers Analytics and Risk-Based Authentication Are Part of Adoption Plans IAM Is Strategic! in a Digitally Transformed Reality An IDC infographic sponsored by RSA 63 59 55 50 46 45 41 41 Strengthening identity and access security Meeting compliance and regulatory standards Improving ability to detect insider threats Ability to integrate with present IAM solutions Keeping within budgets Making admin easier Reducing admin costs Average Driver Importance On 0-100 Scale Simplifying user access 0 20 40 60 80 100 0 20 40 60 80 100 Most Important IAM Considerations Better security, compliance, and user convenience is more important than cost to IAM professionals 56 49 45 38 38 37 35 34 Strengthening identity and access security Improving ability to detect insider threats Meeting compliance and regulatory standards Simplifying user access to resources Ability to integrate with present IAM solutions Reducing admin costs Making admin easier Keeping within budgets % of Total How do you expect the importance of each of these IAM issues to change over the next 2 to 3 years? All features growing in importance lead the pack “Strengthening identity and access security” and “Improving ability to detect insider threats” IAM Solution Drivers ̶ Average Score on a 0 - 100 Scale 57 47 46 33 54 74 26 28 49 38 62 28 50 63 41 22 63 66 59 27 52 45 69 28 49 41 50 82 75 75 35 64 Strengthening identity and access security Meeting compliance and regulatory stds Improving ability to detect insider threats Simplifying user access Ability to integrate with present IAM solutions Keeping within bugets Making admin easier Reducing admin costs Efficacy Focused Compliance Focused Cost Focused Simplification Focused “Simplifying user access" and “Strengthening identity and access security” are the top two drivers for Simplification-focused buyers. For Efficacy-focused buyers, "Strengthening identity and access security” and “Improving ability to detect insider threats” are the top two making "Strengthening Identity and Access Security" the common thread between the two buyer types. The common thread between convenience- driven and compliance-focused buyers: Both want to improve the ability to detect insider threats and strengthen identity and access security At least 76% of respondents are either currently using or plan to adopt behavioral analytics or risk-based authentication in their IAM strategy IAM professionals are looking to invest Expected External Spend Changes IAM in the Next 12 Months IAM professionals who are looking to increase spend outnumber those looking to decrease by more than 7 to 1 All IDC research is © 2017 by IDC. All rights reserved. All IDC materials are licensed with IDC’s permission and in no way does the use or publication of IDC research indicate IDC’s endorsement of RSA’s products or strategies. 39% 6% 7% 48% Same Increase Not Sure Decrease Global Identity Management Assessment Survey, IDC September, 2016 Source: Sponsored by 76%