Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

ThycoticCentrify Report: 57% Of Organizations Suffered Security Incidents Related To Exposed Secrets In DevOps

Survey commissioned from Forrester reveals that centralizing secrets and using consistent tools is the key to securing DevOps innovation

ThycoticCentrify, a leading provider of cloud identity security solutions formed by the merger of the privileged access management (PAM) leaders Thycotic and Centrify, published a new survey report from Forrester that addresses the security innovation paradox in DevOps environments. While revealing that over half of organizations have experienced security incidents related to exposed secrets in the past two years, it also paints a troubling picture where only 5% say that most of their development teams use the same secrets management processes and tools.

Top AiThority.com Insights: “Bitcoin Has No Intrinsic Value”. Then What Gives Bitcoin Value?

The Forrester Opportunity Snapshot report, commissioned by ThycoticCentrify in Spring 2021, titled “Secure Innovation Requires Making DevOps Secrets Management Invisible,” surveyed 227 identity and access management (IAM) decision makers and 160 members of development teams in North America, EMEA, and APAC. While 68% of developers agree that management prioritizes security over release dates, 53% of IAM leaders claim developers lack the understanding or ability to implement proper security controls. The report also finds that while both IAM leaders and developers want to simplify access management, secure access controls are often too manual and full of friction, bottlenecking innovation.

“The migration to cloud and the drive to microservice architectures require a shift to automated application delivery. These new application architectures must be designed with security in mind to ensure compliance and protect the integrity and reputation of the company,” said David McNeely, Chief Technology Officer at ThycoticCentrify. “Securing these new applications should be easy for developers, while simultaneously enabling the flexibility that operations teams need to respond to the demands of the business. This report provides encouraging validation that both security leaders and developers want to centralize and embed secrets management into the tools already in use in continuous integration, continuous deployment pipelines.”

Recommended AI News: LG Announces Limited-time Promotions Featuring Personal LG Audio Products With Select TV And Audio Purchases

Related Posts
1 of 40,572

The key to solving this challenge is to make secrets management invisible to developers and DevOps teams, who agree that doing so would improve their experience (63%) and productivity (69%). To accomplish this, 76% of IAM leaders are looking for purpose-built PAM for DevOps solutions that would help development and security teams work better together.

ThycoticCentrify’s PAM for DevOps secrets management solution, DevOps Secrets Vault, enables organizations to centrally manage, control, and audit secrets for automated processes that operate without human oversight. DevOps Secrets Vault improves productivity for both developers and security teams by reducing friction, embedding automated secure access controls into the DevOps process.

ThycoticCentrify recently introduced geolocation-based routing to ensure customers automatically route to the cloud service closest to their data centers to optimize performance and ensure active failover. The solution is continually improved for ease-of-use, now allowing non-DevOps users the ability to view and manage DevOps Secrets Vault via a user interface versus the Command Line Interface (CLI).

Browse The Complete News About AI: 1&1 Versatel Partners With RingCentral to Bring the Power of Gigabit Internet and Business Communications to its Customers

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.