One In 10 IT Pros Claim To Have Access To Accounts From Previous Jobs: Study

Study also found 51 percent of IT professionals report they are concerned about insider threats to network security

February 16, 2011

3 Min Read

PRESS RELEASE

SAN FRANCISCO--(BUSINESS WIRE)--Quest Software, Inc. (Nasdaq: QSFT):

News Facts:

* A new survey conducted by Quest Software, Inc. (Nasdaq: QSFT) and Harris Interactive examines how IT professionals and employees view the use of policies and technologies to manage and protect users’ electronic identities. The results underscore how these technologies, or lack thereof, are making it more difficult for employees to get their jobs done, and how they are causing greater concern about insider threats to IT security.

* Key research findings, based on two surveys of more than 1,000 employees and 500 IT decision-makers in the U.S., include: o 51 percent of IT professionals report they are concerned about insider threats to network security in their company’s current infrastructure. o One in 10 IT professionals admit they have accounts from previous jobs, from which they can still access systems even though they’ve left the organization. o 52 percent of employees admit that they’ve shared their work log-ins and passwords with other co-workers, and vice versa. o One in four IT professionals spend more than 30 minutes per day logging into different websites and databases they need for work. o 65 percent of workers contact the help desk or IT department at least once per month when they can’t access a system needed for work. o 94 percent of IT professionals say it is important to be able to manage access, user identities and passwords quickly and efficiently. o 90 percent of IT professionals agree that companies need to do more to manage and protect users’ electronic identities. 88 percent say identity and access management is an important mechanism to increase security in companies. o More than a third (34 percent) of IT professionals say their companies don’t realize the value of identity and access management technology as an integral part of their arsenal of security tools.

* Additionally, many of the issues highlighted in this survey can be resolved and simplified with the updated Quest One Identity Solution, announced by Quest today. * Fact Sheet: Check out the in-depth survey findings related to identity and access management: http://www.quest.com/Quest_Site_Assets/News/Fact_Sheet_Quest_Harris_Interactive_IAM_Survey_Findings_2011.pdf

Quotes:

Jackson Shaw, Sr. Director of Product Management, Quest Software

“The management of electronic identities and access has emerged as a significant pain point in the minds of workers and IT professionals, and as a new front line of defense in IT security. Identity and access management is an important mechanism for increasing security in companies, and makes accessing information in databases, applications and websites safer and more efficient. With our announcement of the updated Quest One Identity Solution today, our customers can simplify identity and access management by reducing the number of identities, automating identity administration, and basing identity management on existing investments.”

Get Involved!

* Tweet this: Harris research & @Quest reveals dire risks in managing access. #Identity & access key to mitigate #security risks http://bit.ly/hEiWT5

Talk To Us Directly:

We can arrange a quick phone conversation with our experts, or onsite interviews at RSA– just ask! Or, stop by booth 2232 at the show.

About Us:

Quest Software (Nasdaq: QSFT) simplifies and reduces the cost of managing IT for more than 100,000 customers worldwide. Our innovative solutions make solving the toughest IT management problems easier, enabling customers to save time and money across physical, virtual and cloud environments. For more information about Quest solutions for application management, database management, Windows management, virtualization management, and IT management, go to www.quest.com.

RSS Feeds:

Read more about:

2011
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights