<p>Identity security teams face the frequently conflicting goals of stability, agility and improved security. Identity leaders face a complex world in flux, with enterprise systems continually changing, <a href=”https://www.techtarget.com/searchsecurity/answer/What-are-some-of-the-top-identity-and-access-management-risks”>identity-driven threats increasing</a>, compliance regulations becoming more rigorous and AI-driven apps creating new identity security challenges.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1′)</script>
</div>
</div>
<p>Teams managing workforce identity have accumulated a variety of technology tools to do their jobs. This proliferation poses challenges — and change is in the air.</p>
<p>In my Omdia <a href=”https://research.esg-global.com/reportaction/515202106/Toc” target=”_blank” rel=”noopener”>study</a>, “Identity Security at a Crossroads: Balancing Stability, Agility and Security,” I delved into the market dynamics of workforce identity security to understand and quantify the major pain points for leaders managing identity security.</p>
<p>Identity security is a broad space, and the research touched on topics, including identity governance and administration (<a href=”https://www.techtarget.com/searchsecurity/definition/identity-governance-and-administration-IGA”>IGA</a>), identity verification, identity threat detection and response (<a href=”https://www.techtarget.com/searchsecurity/definition/What-is-identity-threat-detection-and-response-ITDR”>ITDR</a>), and nonhuman identities (NHIs), with a focus on AI agents.</p>
<p>While the study revealed many things, here I’ll focus on the portfolio of workforce identity security tools used today and how teams can <a href=”https://www.techtarget.com/searchsecurity/tip/Rein-in-cybersecurity-tool-sprawl-with-a-portfolio-approach”>address tool sprawl</a> and build effective identity security strategies to meet their organizations’ needs.</p>
<section class=”section main-article-chapter” data-menu-title=”Workforce identity security tool proliferation”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Workforce identity securi
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: