{"id":48187,"date":"2020-10-27T13:06:00","date_gmt":"2020-10-27T17:06:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=resource&p=48187"},"modified":"2022-01-17T20:30:00","modified_gmt":"2022-01-18T01:30:00","slug":"trends-in-identity-access-management-cloud-identities","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities","title":{"rendered":"Trends in Identity and Access Management (IAM): Cloud-driven Identities"},"content":{"rendered":"\n

The broad adoption of public cloud services demands a retooling of identity and access management (IAM) programs. To protect sensitive cloud-resident data, cybersecurity and IT operations teams need to work with their line-of-business teams on strengthening identity programs with both the user experience and risk in mind.

In order to gain insight into these trends, ESG surveyed hundreds of IT and cybersecurity professionals across the US and Canada who are responsible for evaluating or purchasing IAM  and cloud security technology products and services. This research aimed to understand the problem space, organizational responsibilities, compliance implications, and plans for securing user access to a wide portfolio of cloud services. The study also looks at the current and planned use of various auth methods, privileged access management, device profiling, unified directories, and user activity analytics.<\/p>\n","protected":false},"excerpt":{"rendered":"

The broad adoption of public cloud services demands a retooling of identity and access management (IAM) programs. To protect sensitive […]<\/p>\n","protected":false},"author":44,"featured_media":0,"template":"page-templates\/gated-content.php","categories":[2337],"collection":[2775],"wheel_hubs":[2328,2335],"platform":[2360],"resource_type":[2311],"funnel_stage":[],"coauthors":[2596],"acf":[],"yoast_head":"\nTrends in IAM: Cloud-Driven Identities - JumpCloud<\/title>\n<meta name=\"description\" content=\"This research aimed to understand the problem space, organizational responsibilities, compliance implications, and plans for securing user access to cloud services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trends in Identity and Access Management (IAM): Cloud-driven Identities\" \/>\n<meta property=\"og:description\" content=\"This research aimed to understand the problem space, organizational responsibilities, compliance implications, and plans for securing user access to cloud services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-18T01:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/07\/202405-MISC-JumpCloudResources-SiteDisplay-min-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"890\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Shane Watson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities\",\"url\":\"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities\",\"name\":\"Trends in IAM: Cloud-Driven Identities - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"datePublished\":\"2020-10-27T17:06:00+00:00\",\"dateModified\":\"2022-01-18T01:30:00+00:00\",\"description\":\"This research aimed to understand the problem space, organizational responsibilities, compliance implications, and plans for securing user access to cloud services.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/jumpcloud.com\/resources\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trends in Identity and Access Management (IAM): Cloud-driven Identities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Trends in IAM: Cloud-Driven Identities - JumpCloud","description":"This research aimed to understand the problem space, organizational responsibilities, compliance implications, and plans for securing user access to cloud services.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities","og_locale":"en_US","og_type":"article","og_title":"Trends in Identity and Access Management (IAM): Cloud-driven Identities","og_description":"This research aimed to understand the problem space, organizational responsibilities, compliance implications, and plans for securing user access to cloud services.","og_url":"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities","og_site_name":"JumpCloud","article_modified_time":"2022-01-18T01:30:00+00:00","og_image":[{"width":890,"height":525,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2024\/07\/202405-MISC-JumpCloudResources-SiteDisplay-min-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute","Written by":"Shane Watson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities","url":"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities","name":"Trends in IAM: Cloud-Driven Identities - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"datePublished":"2020-10-27T17:06:00+00:00","dateModified":"2022-01-18T01:30:00+00:00","description":"This research aimed to understand the problem space, organizational responsibilities, compliance implications, and plans for securing user access to cloud services.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/resources\/trends-in-identity-access-management-cloud-identities#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/jumpcloud.com\/resources"},{"@type":"ListItem","position":3,"name":"Trends in Identity and Access Management (IAM): Cloud-driven Identities"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource\/48187"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/44"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=48187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=48187"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=48187"},{"taxonomy":"wheel_hubs","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/wheel_hubs?post=48187"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=48187"},{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/resource_type?post=48187"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=48187"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=48187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}