Over the last year, 38% of organizations<\/a> have made shifting to the public cloud their top priority. Many have started by migrating email, productivity software, and web hosting, and this is where a majority of 2019 IT budgets<\/a> are expected to be spent as well. <\/p>\n\n\n\n
What about the IT management tools used to manage users access to these cloud resources on a daily basis, like cloud identity management<\/a> for instance? Well, it\u2019s not a top priority. Only 6% of cloud IT budgets for 2019<\/a> are going towards IT management. If organizations plan to experience the agility, efficiency, and security gains the cloud has to offer, this is ill-advised. They need to consider why cloud identity management should be a priority as they continue to execute on their cloud strategy.<\/p>\n\n\n
The identity sits at the center of all work that happens at an organization. The role of an identity management solution is to securely connect end users to the systems, apps, file storage, and networks they require to do their job. When the right identity provider is in place, IT admins can automate most of their user and system management. This creates more consistency and gives sysadmins more time for higher value tasks.<\/p>\n\n\n\n
At the same time, end users gain frictionless access to their digital tools. For example, the average user takes 14 seconds to type a password<\/a>. When centralized identity management<\/a> is in place, users only have one password to deal with.<\/p>\n\n\n
What does this add up to for a 50 person company over the course of a year?<\/p>\n\n\n\n
That\u2019s a ton of time spent on typing credentials. On top of that, 76% of employees<\/a> regularly experience password problems. Also, if 76% of employees regularly experience password problems, that means IT spends a lot of time helping users reset their passwords. In fact, about 20 \u2013 50% of IT support tickets<\/a> are password resets.<\/p>\n\n\n\n
So, why should IT admins consider a cloud identity provider<\/a> (IdP) over a traditional identity and access management (IAM) solution? Well, first, it enables them to go all cloud and fully take advantage of the efficiency, agility, and cost savings the cloud has to offer. Next, legacy identity providers weren\u2019t built for the heterogeneous IT landscape that has enterprises deploying Macs in the 1000\u2019s<\/a>, Linux running 90% of the public cloud<\/a>, and companies paying for 20+ SaaS applications<\/a> on average. Traditional IAM solutions were created for on-prem homogeneous environments.<\/p>\n\n\n\n
So, it makes sense that the diversity of IT systems and technology was one of the top challenges in managing IT infrastructure for 47% of participants in a\u00a0<\/em>Ponemon study<\/a>.<\/em><\/p>\n\n\n\n
A platform-agnostic, provider-independent IAM solution with a multi-protocol approach means organizations (and their employees) will have more choices. Instead of being limited to specific protocols and platforms, they can leverage whatever IT resources that make the most business sense for them. This was imperative for Cabify<\/a>, a cloud-forward transportation network company that grew over 3000% in the last two years. <\/p>\n\n\n\n
After all, would it really have made sense to spend $120,000 on upgrading a Windows operating system solely because the directory service didn\u2019t support it? Cabify didn\u2019t think so.<\/em><\/p>\n\n\n\n
Furthermore, Cabify works in a \u201cheterogeneous environment<\/a>. [They] use Mac and Linux in addition to Windows, and Active Directory doesn\u2019t work well with either of them.\u201d So it really didn\u2019t make sense for Cabify to spend so much money on adapting their environment to the identity provider, to only have it manage part of their environment. It would have been like \u201c\u2026putting a big dinosaur in the middle of the room\u2026\u201d, and a really expensive dinosaur at that. What they needed instead, was an IAM solution that could adapt to their environment and navigate change with ease. Cloud identity management is doing just that by \u201cpaving the way\u201d for Cabify to accomplish their IT vision.<\/p>\n\n\n\n
A cloud IAM solution that supports systems, applications, file storage, and networks regardless of protocol, platform, provider, and location is a powerful IT management tool. It centralizes user access to virtually all IT resources, thereby eliminating ad hoc processes. Cloud IAM was certainly the powerful tool Doublestruck<\/a> needed to Make Work Happen\u2122 for their sysadmins and end users. Before the London based education tech innovator implemented a cloud IdP:<\/p>\n\n\n
\u201cThey were really feeling the pain of having a bunch of systems all set up different ways for different users. [Their] end users were feeling that pain too.\u201d<\/em><\/p>\n\n\n\n
As soon as they implemented a cloud identity provider and centralized everything, \u201cidentity and access management<\/a> got much easier. [For starters] users have the same password for everything.\u201d Consequently, users aren\u2019t forgetting their password, so they\u2019re submitting fewer support tickets related to password resets. In the event a user does forget it, they can easily reset it themselves. With the reduction in password resets alone, Doublestruck IT admins have been able to focus more of their time on \u201cbuilding new infrastructure and resources for the company rather than keeping access up to date.\u201d Even more importantly, it has \u201cenabled end users to avoid lockout delays,\u201d allowing them to seamlessly access their IT resources day in and day out.<\/p>\n\n\n\n
An IDG survey<\/a> discovered 52% of participants expected their security budgets to increase in 2018. What are organizations using their security budgets for?<\/p>\n\n\n\n
Making cloud identity management a priority can help with both security factors. A cloud identity provider enables IT admins to centrally enforce identity security best practices with features such as Password Complexity Management<\/a>, Multi Factor Authentication<\/a>, and SSH key authentication<\/a>. Additionally, IT admins can use IAM to lock down systems in their environment using security policies<\/a>, which can remotely disable USB drives or require Full Disk Encryption.<\/p>\n\n\n\n
When Cabify set out to standardize identity management, elevating security best practices was a key objective. In the past, \u201ceveryone [in Cabify] was logging on to their systems using local accounts. Some of them were generic, and there were no sufficient tools to enforce password security<\/a>\u2026 With [a cloud identity management solution], they\u2019ve been able to clean that up, and it\u2019s been huge for [Cabify] to move users away from using local accounts on their Windows and Mac systems.\u201d<\/p>\n\n\n\n
Enforcing security best practices often goes hand in hand with meeting identity compliance<\/a> regulations. This was certainly the case for Doublestruck and their need to prepare for GDPR compliance<\/a>. \u201cOne of the big rules that [Doublestruck] must follow for GDPR is to have a way to say who has access to what data at what time. [Doublestruck\u2019s] old setup had so many accounts being shared\u201d it would have almost been impossible to do that. However, implementing a cloud identity management solution allowed them to fix that. They were able to \u201cseparate out all of [the] user accounts. By the time GDPR came around\u201d Doublestruck was prepared, and \u201c[they] can\u2019t think of any organization that wouldn\u2019t benefit\u201d from a cloud identity provider.<\/p>\n\n\n\n