Identity security tool sprawl: Origins and the way forward

<p>Identity security teams face the frequently conflicting goals of stability, agility and improved security. Identity leaders face a complex world in flux, with enterprise systems continually changing, <a href=”https://www.techtarget.com/searchsecurity/answer/What-are-some-of-the-top-identity-and-access-management-risks”>identity-driven threats increasing</a>, compliance regulations becoming more rigorous and AI-driven apps creating new identity security challenges.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1′)</script>
</div>
</div>
<p>Teams managing workforce identity have accumulated a variety of technology tools to do their jobs. This proliferation poses challenges — and change is in the air.</p>
<p>In my Omdia <a href=”https://research.esg-global.com/reportaction/515202106/Toc” target=”_blank” rel=”noopener”>study</a>, “Identity Security at a Crossroads: Balancing Stability, Agility and Security,” I delved into the market dynamics of workforce identity security to understand and quantify the major pain points for leaders managing identity security.</p>
<p>Identity security is a broad space, and the research touched on topics, including identity governance and administration (<a href=”https://www.techtarget.com/searchsecurity/definition/identity-governance-and-administration-IGA”>IGA</a>), identity verification, identity threat detection and response (<a href=”https://www.techtarget.com/searchsecurity/definition/What-is-identity-threat-detection-and-response-ITDR”>ITDR</a>), and nonhuman identities (NHIs), with a focus on AI agents.</p>
<p>While the study revealed many things, here I’ll focus on the portfolio of workforce identity security tools used today and how teams can <a href=”https://www.techtarget.com/searchsecurity/tip/Rein-in-cybersecurity-tool-sprawl-with-a-portfolio-approach”>address tool sprawl</a> and build effective identity security strategies to meet their organizations’ needs.</p>
<section class=”section main-article-chapter” data-menu-title=”Workforce identity security tool proliferation”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Workforce identity securi

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: