Why Read This Report
Overall spending on cybersecurity technologies and staffing is at an all-time high, but statistics show that the average size of data breaches continue to rise, and a large percentage of hacking-related breaches leverage either stolen and/or weak passwords. These metrics show a clear misalignment between cybersecurity investments and outcomes. Higher education institutions are particularly rich targets for data breaches. This guidebook reviews the research and surveys the market to draw conclusions and make recommendations about how an IAM strategy should evolve to protect the institution’s business risks and goals.
Key Questions Answered
- Why are higher education institutions very rich targets for data breaches?
- What are the current IAM trends in higher education around policies, staffing, and tool adoption?
- How do IAM programs differ by size and type of institution?
- What are the steps to starting or expanding an IAM program?
- How does an institution benchmark their current IAM capabilities and plan a maturity roadmap?
- Download complimentary Executive Summary.
- Author: Katelyn Ilkani, VP, Cybersecurity Advisory Practice, The Tambellini Group.
- Report Length: 48 pages.
- Report Availability: March 2018.
Tambellini members enjoy direct access to the industry’s top analysts, premium reports as well as an array of research data, analytics, and advisory services. Our unbiased reports, white papers, guides, case studies, and vendor profiles provide critical information on current technology trends, strategic thinking, and market scrutiny to aid our clients in aligning resources and strategies to achieve their ultimate goals and objectives.
Already a member?
Log in to access this report. As a Tambellini member, this report is included in your subscription fee.
Become a member
Tambellini offers research, analyst, and advisory services with an exclusive focus on higher education.
Regardless of organization type, size, or budget, Tambellini can tailor membership services to uniquely fit your needs. To become a member, contact Client Services or visit Our Services page.
Table of Contents
- Executive Summary
- Previous Work
- Aegis Identity
- Harvard University
- The Tambellini Group
- Gaps in the Previous Work
- Methodology for this Guide
- Primary Research Methodology
- Secondary Research Methodology
- Primary Research Findings by Peer Group
- Barriers and Enablers to IAM Adoption
- Importance of Compliance
- Staff Needed for an IAM Program
- Enterprise vs. Homegrown vs. Open Source Tool Adoption
- Yearly IAM Software Costs
- The Maturity Curve — Functional Gaps
- Basic/Foundational Gaps
- Enhanced Gaps
- Advanced Gaps
- The 24-Month Outlook for Cloud IAM Tool Adoption
- Steps to Starting or Expanding an IAM Program
- People, Processes, and Technology
- The Role of Frameworks
- Appendix 1: Interview Questions
- Appendix 2: Survey Questions
- About the Author
- About The Tambellini Group
- Tambellini Group Research Methodology
- Other Reports Available