This resource is no longer available

Cover Image

ESG recently surveyed 379 IT and cybersecurity professionals at organization personally responsible for evaluating or purchasing identity and access management and cloud security technology products and services.

This research aimed to understand the problem space, organizational responsibilities, compliance implications, and plans for securing user access to a wide portfolio of cloud services.

Download the report to uncover the results as well as the current and planned use of various authentication methods, privileged access management, device profiling, unified directories, user activity analytics, and service account protection.

Vendor:
CyberArk
Posted:
Feb 8, 2021
Published:
Nov 25, 2020
Format:
PDF
Type:
Analyst Report

This resource is no longer available.