Connect with us

Hi, what are you looking for?

HEADLINES

Keeper Security survey finds most Privileged Access Management solutions too complex; 68% of organizations paying for wasted features 

PAM adoption is widespread, with 91% of survey respondents saying their organisations use a PAM product. But the findings show traditional PAM products are failing to meet organisational needs. More than two-thirds of IT managers (68%) say their current PAM product is too complicated or has too many features they don’t use, and 87% of respondents would prefer a pared down form of PAM that is easier to deploy and use.

Photo by Simon Abrams from Unsplash.com

Keeper Security, provider of cloud-based zero-trust and zero-knowledge cybersecurity software protecting passwords, secrets and connections, released findings from its Privileged Access Management Survey: User Insights on Cost & Complexity

The report explores global insights from IT and security executives, revealing an overwhelming industry desire for Privileged Access Management (PAM) solutions that are easier to deploy and maintain: 84% of global IT leaders say they want to simplify their PAM solutions in 2023.

Traditional PAM solutions aren’t working

As cybersecurity threats continue to grow, IT leaders are seeking effective PAM solutions that can provide visibility, security, control and reporting across every user, on every device. PAM adoption is widespread, with 91% of survey respondents saying their organizations use a PAM product. But the findings show traditional PAM products are failing to meet organizational needs. More than two-thirds of IT managers (68%) say their current PAM product is too complicated or has too many features they don’t use, and 87% of respondents would prefer a pared down form of PAM that is easier to deploy and use.

Advertisement. Scroll to continue reading.

Additional report findings show:

  • On average, IT teams only use 62% of their current PAM functionality. Fifty-eight percent of respondents agree there is waste in their PAM solution.
  • Roughly two-thirds of survey respondents indicate that pricey and superfluous PAM features create too much complexity for users, reducing user satisfaction.
  • More than half of all IT teams (56%) report they tried to deploy a PAM solution but never implemented it. Of those, 92% said it was because their PAM solution was too complex. 
  • Most organisations (85%) say their PAM product requires dedicated staff to manage and maintain. 
  • Two-thirds of IT leaders (66%) say they need a better PAM solution, but 58% say they do not have one because it is too expensive.

“Organisations must secure their privileged credentials, accounts and sessions to protect themselves,” said Darren Guccione, CEO and co-founder of Keeper Security. “The Privileged Access Management Survey: User Insights on Cost & Complexity reveals why IT and security leaders are dissatisfied with traditional PAM products. The industry needs modern, unified PAM solutions that address perimeterless, multi-cloud IT environments and distributed remote workforces. These solutions must provide essential functionality with zero-trust security, and at the same time, be cost-effective, easy to implement and engaging for end users.”

Streamlined PAM solutions meet new operational challenges

Alarmingly, nearly two-thirds of IT leaders (62%) say the downturn in economic conditions will likely cause them to scale back their current PAM platform. Today’s IT and security leaders require a PAM solution that protects their most sensitive systems without the complexity and unnecessary features that drive up costs. The research shows their top criteria include solutions that are quick to deploy, affordable, and simple to understand and integrate.

Based on the survey results, the top five benefits IT leaders seek in a PAM solution include:

  • Managing and monitoring privileged user access
  • Protecting against compromise of privileged credentials by external threat actors
  • Preventing data breaches
  • Protecting against accidental or deliberate misuse of privileged access by company insiders
  • Ensuring privileged user access is updated to prevent “privilege creep”

Respondents also share the top five benefits of a simplified PAM solution:

  • Easier to deploy
  • Easier to integrate into other systems
  • Cost savings
  • Consolidated platform
  • Requires less staff

The digital landscape continues evolving beyond the average IT professional’s control. To maintain visibility and stay ahead of the next wave of cyberthreats, IT and security leaders must adapt, automate and advance with the ever-changing workplace. While PAM solutions are primarily designed to protect IT staff, executive leadership, and research and development staff, the accelerated digital transformation and current high-risk security climate make protecting all end-users within an organization increasingly essential.

Download the full report to learn more.

Advertisement. Scroll to continue reading.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

HEADLINES

Deepfakes pose significant threats and risks, with nearly half of companies worldwide reporting incidents in 2024, according to industry reports. HONOR’s innovative solution immediately...

HEADLINES

The Philippines’ global ranking for local threats rose from 76th to 66th, highlighting the need for stronger cybersecurity measures.

HEADLINES

Despite 65% having adopted generative artificial intelligence (GenAI capabilities), 89% of IT leaders are concerned that flaws in GenAI cybersecurity tools could put their...

APPS

PSBank is reinforcing its commitment to security through key enhancements to its PSBank Mobile app.

Advertisement