The modern business world doesn’t go around without them: contractors, outsourced service providers and partners. Collectively known as third parties, they can be outside developers, business consultants, freelancers or partners who must connect to your network to deliver their support.

But do you really know what they do once these outside users are logged in?

Are they viewing confidential resources or accessing customer data?

Get your copy of our research executive summary to find out. Key data points include:

  • Ineffective third-party user lifecycle management practices are widespread, which puts organizations at increased risk.
    • Only 21% of organizations immediately deprovision (or revoke access for) third-party users when the work they do for the company ceases.
    • One-third (33%) of organizations take more than 24 hours to deprovision third-party users or do not have a consistent deprovisioning process.
  • Organizations predominantly lack confidence that third-party users follow security best practices and policies—and likely trust them too much.
    • Only 15% are very confident that their third parties follow access management rules, such as not sharing accounts and ensuring password strength.
    • One in four (25%) suspect third parties do not follow the rules or know for certain they do not.
    • However, 45% of respondents trust third-party users the same amount or more than they do their own employees to follow their organizations’ security policies.

Blog Post CTA Image

About the One Identity Global Survey 2019, Third-Party Access and Compromise

The One Identity Global Survey 2019 consisted of an online survey conducted by Dimensional Research of IT professionals in midsize to large organizations with responsibility for security and who are very knowledgeable about IAM and privileged accounts. A total of 1,005 individuals from the U.S., Canada, U.K., Germany, France, Australia, Singapore and Hong Kong completed the survey.

Anonymous
Related Content