Email Header

New survey report shows overprivileged users still a big challenge for IT professionals


say least privilege is either a top or urgent priority for their organization


have already tried and failed to implement least privilege


say threats from employees and third parties’ drives need for least privilege


say compliance is their main concern triggering least privilege projects

2020 Global Cyber Security-500x3122020 Global Cyber Security. -500x312

Read this report to understand these key takeaways

#1 Least privilege is too complex for a single technology fix; it must be an ongoing program

Driven primarily by concerns with internal and third-party threats, as well as compliance mandates, least privilege must be viewed as an ongoing program rather than a project that can be solved with any one technology solution.

#2 A least privilege implementation that hinders user productivity will fail

If you want your least privilege implementation to succeed, you need comprehensive solutions that minimize the impact on user productivity, earn executive level support, and operate in the background.

#3 One size does not fit all for least privilege. Communicate and customize to control

You must customize your least privilege strategy to fit the needs of your own organization. Educate users on the value of least privilege while making sure they can do their jobs without compromising security.