Why the channel must tackle identity sprawl to increase cyber resilience

footballers

Due to a number of factors, such as the migration to remote working and the adoption of robotic process automation (RPA), the number of identities that organisations now have to contend with has more than doubled. This includes internal, third party, and customer identities.

This “identity sprawl” ultimately equates to more security challenges that need addressing. Coupled with the fragmented way organisations tackle the management of access rights, identity sprawl could be the recipe for disaster for enterprises which aren’t looking to mitigate the inconsistencies, gaps, and extended attack surface of today’s digital environments.

What causes identity sprawl?

The disappearance of the traditional office infrastructure while employees work from home has meant that new remote access points had to be created for those organisations that were still operating completely on-prem. This also forced a, sometimes premature, digital transformation, as all businesses had to swiftly move their assets to the cloud to continue to operate during the pandemic.

The forced digital transformation brought about by the pandemic also pushed many enterprises to adopt new platforms and technologies to accommodate remote operations and remote access, optimise efficiency and accessibility, and save costs. Also linked to cost-saving is the mass adoption of RPA technology, which allows companies to outsource to robots the repetitive, time-consuming processes that would have otherwise been completed manually.

Do we need to be worried?

Identity sprawl might easily be the next big challenge in cybersecurity. According to the 2021 Verizon Data Breach Investigations Report, 80% of cyber incidents include the exploitation of identities. Employees, third-party contractors, robots, machines, and devices with credentials that give them access to company assets, are all risk factors organisations need to have a strategy to manage.

In fact, 8 in 10 security experts interviewed as part of a recent research from One Identity into the phenomenon of identity sprawl said the identities they manage have doubled, while 25% said they have increased by a factor of 10 or more. If we think of each of these identities as a key to the organisation’s network, this increase becomes even more concerning: every extra set of keys increases the chance that they might fall into the wrong hands and provide access to sensitive data and critical systems. It shouldn’t therefore come as a surprise that 95% of the experts interviewed said they find managing identities a challenge.

What to expect in the future of identity access management

Industry experts recognise that ransomware (66%), phishing (52%) and RPA adoption concerns remain top of mind (94 % of organisations who have deployed bots or RPA report challenges securing them). Therefore, companies must plan to bolster business resiliency where they can – including investing in enhanced identity and governance administration (IGA) and privileged access management (PAM) solutions that can secure and govern growing identity ecosystems.

Identity sprawl will likely also have an effect on how zero trust architecture is adopted by enterprises. More and more companies are adopting the “never trust, always verify” mantra to manage their risk as cloud-based systems, remote work, and connected devices dissolve network perimeters. This is a step in the right direction, as it responds to the needs of the businesses of the future, which are likely to remain flexible in terms of remote working, and the continued reliance on cloud-based assets outside their own network boundaries. This shift will provide channel partners a growth opportunity - as strong security starts with identity.

What can the channel do?

Channel partners in the IAM space have the chance to spearhead efficiency and cyber resilience by tackling identity sprawl and promoting a 360 view of all identities, including approaching identity security from a holistic and unified perspective. As technology is validated by analysts such as Gartner or Forrester, benchmark reports are produced and partners can use this analyst data to help investigate the full extent of a customer’s challenges and use it to re-enforce their technology positioning to meet their needs.

To assist channel partners in extending their knowledge, vendors should also adapt their partner learning experiences to provide more immersive sessions. These include video-based training with associated testing, plus hands-on bootcamps that bring together like-minded peers. It’s a place where the training and discussions help partners understand and then apply the technology to their own customers’ unique needs. Technical training has also evolved to deliver self-paced learning so consultants and other security experts can consume the material at a time that is convenient to them.

Andrew Clarke is head of partnerships & alliances at One Identity

Read more
3D glass wavy background. Science fiction or information technology concept.
How the channel can simplify cybersecurity to build trust and agility for SMBs
Hand holding glowing sphere with shooting off purple ribbons of light
The AI challenge for the channel
Two cyber workers with medium-dark skin tone, a woman on the left and a man on the right with his face from chin down obscured by a monitor, with code reflected in their glasses implying they work in cybersecurity or software engineering. The room is dark around them, but bright screens can be seen in the background.
Cybersecurity skills: Addressing gaps and challenges in 2025
Hand with a judge's gavel with in a futuristic background
How the IT channel can help on the route to cybersecurity regulatory compliance
Digital shield icon hologram on future tech background
Strategies for guarding against emerging cyber risks and invisible threats
Water droplet impact causing ripples
Turning the tide: the need for a digital detox in the wake of tech’s digital hangover
Latest in Security
Ransomware concept image showing a warning symbol in red with binary code in background.
Healthcare systems are rife with exploits — and ransomware gangs have noticed
Application security concept image showing a digitized padlock placed upon a digital platform.
ESET looks to ‘empower’ partners with cybersecurity portfolio updates
NHS logo displayed on a smartphone screen in white lettering on a blue background.
NHS supplier hit with £3m fine for security failings that led to attack
OpenAI logo and branding pictured at Mobile World Congress 2024 in Barcelona, Spain.
OpenAI announces five-fold increase in bug bounty reward
Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.
These five countries recorded the most third-party data breaches last year
Phishing concept image showing an email symbol with fishing hook.
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Latest in Feature
A photo of UNSW's Sunswift 7 car pictured in front of Uluru in Australia's Northern Territory.
How UNSW’s Sunswift Racing and Ericsson achieved cross-country connectivity in Australia’s outback
Matt Clifford speaking at Treasury Connect conference in 2023
Who is Matt Clifford?
Open source vulnerabilities concept image showing HTML code on a computer screen.
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
An abstract CGI image of a large green cuboid being broken in half with yellow, orange, and red cubes to represent ransomware resilience and data encryption.
Building ransomware resilience to avoid paying out
The words "How effective are AI agents?" set against a dark blue background bearing the silhouettes of flowchart rectangles and diamonds to represent the computation and decisions made by AI agents. The words "AI agents" are yellow, while the others are white. The ITPro Podcast logo is in the bottom right-hand corner.
How effective are AI agents?
An illustration showing a mouth with speech bubbles and question marks and a stylized robot alien representing an AI assistant chirping away with symbols and ticks, to represent user annoyance with AI assistants.
On-device AI assistants are meant to be helpful – why do I find them so annoying?