Skip to main content
banner image
venafi logo

Venafi Study: Do Enterprises Struggle with Machine Identities?

Venafi Study: Do Enterprises Struggle with Machine Identities?

machine identity protection study
August 29, 2018 | Eva Hanscom

Managing user and machine identities and privileged access to business data and applications is an enormous undertaking that has serious security ramifications.

Traditionally, the focus for identity and access management (IAM) programs has been people-centric, but recent increases in the number of machines on enterprise networks, shifts in technology and new computing capabilities have created a set of challenges that require increased focus on protecting machine identities.

Venafi wanted to see how enterprises are facing machine identity protection challenges. We’re pleased to announce the results of "Securing The Enterprise With Machine Identity Protection", a June 2018 commissioned study conducted by Forrester Consulting on behalf of Venafi.The study includes responses from 350 senior IT security professionals who are responsible for their organizations’ identity and access management from the U.S., U.K., Germany, France and Australia.

From Securing The Enterprise With Machine Identity Protection, Forrester Consulting, June 2018: “Newer technologies, such as cloud and containerization, have expanded the definition of machine to include a wide range of software that emulates physical machines. Furthermore, these technologies are spawning a tidal wave of new, rapidly changing machines on enterprise networks. To effectively manage and protect machine identities, organizations need: complete visibility of all machine identities across their networks; actionable intelligence about each machine identity; and the capabilities to effectively put that intelligence into action at machine speed and at scale.”

Key findings from the study reveal that 96% of companies believe that effective protection of machine and human identities are equally important to the long-term security and viability of their companies. However, 80% of respondents struggle with the delivery of important machine identity protection capabilities.

Additional findings from the study include:

  • 70% admit they are tracking fewer than half of the most common types of machine identities found on their networks. When asked which specific machine identities they track:
    • Just 56% say cloud platform instance machine identities.
    • Only 49% say mobile device machine identities.
    • Only 49% say physical server machine identities.
    • Only 29% say SSH keys.
    • Only a quarter (25%) say machine identities of microservices and containers.
       
  • 61% say their biggest concern regarding poor machine identity protection management is internal data theft or loss.
     
  • Nearly half (47%) believe protecting machine identities and human identities will be equally important to their organizations over the next 12 to 24 months, while nearly as many (43%) think machine identity protection will be more important.

“It is shocking that so many companies don’t understand the importance of protecting their machine identities,” said Jeff Hudson, CEO of Venafi. “We spend billions of dollars protecting user names and passwords but almost nothing protecting the keys and certificates that machines use to identify and authenticate themselves. The number of machines on enterprise networks is skyrocketing and most organizations haven’t invested in the intelligence or automation necessary to protect these critical security assets. The bad guys know this, and they are targeting them because they are incredibly valuable assets across a wide range of cyber-attacks.”

Want to learn more about the study? Check out the webpage below for additional information: 

https://www.venafi.com/forrester-whitepaper

Related posts

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

lawyer reading from legal books on a desk, with a scale in the foreground

Do We Trust Governments to Effectively Regulate Privacy? [Ask Security Professionals]

hands reaching out of laptop screen holding ballot box, another person's hand casting a vote
Encryption

Will Encryption Backdoors Hurt Election Infrastructure? Security Professionals Say Yes.

Man standing in front of a cyber-secured world.

What If You Could Guarantee Eliminating Outages in Your Organization?

About the author

Eva Hanscom
Eva Hanscom

Eva is Public Relations Manager at Venafi. She is passionate about educating the global marketplace about infosec and machine-identity issues, and in 2018 grew Venafi's global coverage by 45%.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat