This resource is no longer available
ESG recently surveyed 379 IT and cybersecurity professionals at organization personally responsible for evaluating or purchasing identity and access management and cloud security technology products and services.
This research aimed to understand the problem space, organizational responsibilities, compliance implications, and plans for securing user access to a wide portfolio of cloud services.
Download the report to uncover the results as well as the current and planned use of various authentication methods, privileged access management, device profiling, unified directories, user activity analytics, and service account protection.