While many IT leaders use technology to continuously monitor their environment for identity access management cybersecurity risks, almost 100 percent have yet to put technology in place to proactively identify security risks. A recent surveyย conducted byย Pulseย on behalf ofย Hitachi IDย focused on exploring the gaps that exist within the current technology stacks of IT organizations and how automation is aiding their cybersecurity defenses.
Recommended ITech News: The Worldโs First 0.49mm Fine-Pitch Mini-LED Display Panel Using 36 Pixel-in-1 MiniLED ฯLED Package.
Ransomware and cyber attacks have surged over the past year due to a variety of factors โ including the work-from-home boom which resulted in new security risks and increasing irrelevance of traditional security perimeters. As businesses prepare for the post-pandemic economy and lay plans to return to the office, itโs becoming increasingly clear that hybrid work models are here to stay. As a result, IT and security leaders must re-think and re-prioritize their cybersecurity needs due to the rising risk of threats to their data.
โWhen it comes to security breaches, time is never on your side,โ said Nicholas Brown, CEO at Hitachi ID. โAnd with the rising threat of cyber attacks, organizations can no longer afford to take a reactive approach to their cybersecurity postures. They must be proactive. At Hitachi ID, weโre helping IT leaders address this urgency with automated identity access management solutions to stay ahead of breaches and identify and address threats before an attack.โ
Other survey findings include:
- 100% of IT executives believe discovering and mitigating identity and access threats is a pain point for their IT departmentโs resources.
- 98% of IT executives say COVID-19 has accelerated the need to improve cybersecurity
- 99% of IT executives don’t have complete visibility into their organization’s identity and access vulnerabilities and the success of their remediation efforts.
- None of the respondents have completely automated identity access management processes, while 60% say only up to half of their processes are automated.
- 68% of IT executives use an automated solution once theyโve discovered a threat.
Recommended ITech News:ย Blue Hexagon Augments AWS Network Firewall with AI-based Cloud-Native Threat Detection

