Breaches drive enterprises to prioritize access governance
Aveksa announced the findings of a recent survey conducted to examine how companies are re-evaluating their IT security measures following the recent security breaches at Epsilon, Sony and RSA.
Survey respondents, consisting of IT executives from large, global companies, were asked if the recently publicized IT security breaches increased their concerns over who has access to their company’s critical applications and data.
According to the results of the survey, 58% of respondents stated they had a significant or moderate increase in concerns around IT access as a result of the breaches.
Respondents were then asked to list the IT security initiatives they plan to address in the next 12 months to help reduce the threat of future security breaches. 67% of the respondents selected “Implement Stronger Access Governance Controls” as the most important IT initiative their company will implement in the coming year to help reduce security threats.
Access Governance has recently emerged as one of the fastest growing and most critical initiatives in IT security. This is due to increasing pressure on IT organizations to gain better control over enterprise-wide access to applications and sensitive data in order to reduce security vulnerabilities from both internal and external threats.
By implementing Access Governance automation solutions, companies not only make their IT environments more secure, they are also able to more easily meet regulatory compliance requirements as well as make governing access to critical applications and data more efficient and cost effective.
“Many of the recent IT security breaches came as a result of unauthorized access to applications and data,” said Vick Viren Vaishnavi, President and CEO of Aveksa. “As our recent poll indicates, companies are beginning to look at Access Governance as a major line of defense for preventing these types of security breaches since it provides IT organizations with full control over who has access to critical applications and data, and ensures that access is continuously updated in real-time as changes are made across the enterprise.”