Understanding the threat landscape
The recent widespread Snowflake credential breach, affecting over 150 organisations, underscores the importance of Identity and access management (IAM) as the first line of defence against ever-sophisticated methods of attack. This incident highlights that no organisation is exempt from threat, regardless of size or industry.
Staying ahead of these threats is critical. After all, it’s said hackers don’t hack in; they log in. Implementing robust and efficient solutions is a given – but actions demand insight. This is where research shines, providing the foundations for strategic decision-making and allowing organisations to stay ahead of competitors.
Methodology: Blending Quantitative and Qualitative Approaches
To gain deep market insights, we employed a blended research methodology. Quantitative research produces hard numbers and measurable data that helps decision-making and trend analysis. However, asking the right questions is essential and challenging.
For this research, we instead began with an exploratory qualitative approach, delving into the experience and thoughts of IT decision makers. These insights then informed our quantitative piece, allowing us to single in on specific topics with greater visibility and understanding.
This blended approach allowed us to gain a comprehensive understanding of IAM through rich, detailed insights with precise, measurable data, enhancing the validity and credibility of the results.
So, what did we find out?
Security is prioritized, yet inefficient
Our research revealed that security is an absolute priority for organizations. This was emphasized during our in-depth interviews:

However, our quantitative research showed that, on average, respondents’ organisations use 4 different authentication processes across their applications. Despite this, 21% reported multiple security breaches over the last 12 months.
This contradiction highlights the importance of market insight. On the surface, organisations may feel protected with multiple authentication processes, but they remain vulnerable. Could your organisation also be living under a false sense of security?
Organizations are experiencing challenges with IAM
Nearly nine in ten (89%) organisations face challenges with their current authentication methods.
Understanding these challenges can give your organization an advantage. Knowing that many organizations struggle with out-dated approaches and technologies (31%), for instance, can encourage the adoption of more advanced and secure solutions.
In the current threat landscape, risks are constantly evolving. Cybercriminals are becoming more sophisticated and reliance on outdated authentication methods exposes organizations to increased vulnerabilities. In fact, respondents identified phishing (72%) and social engineering (62%) pose the biggest threats to their organization’s identity management. Therefore, adopting robust, modern authentication methods is essential.
So what does the future hold for Identity and Access Management?
Our in-depth interviews showed that passwordless solutions had a crucial role to play in the future of identity and access management.
Biometric authentication is highly effective, eliminating the need for traditional credentials. Organisations clearly recognise this, as nearly two thirds (63%) currently use, or are planning to use fingerprint recognition. Slightly fewer saying the same for facial (45%) and voice (36%) recognition.
Our rich qualitative insights, we know that participants also see value in combining these methods. A multi-modal approach, requiring multiple forms of verification, would enhance protection, improve user convenience and reduce the likelihood of false positives.
Does your organization currently use, or plan to use any of these biometric methods? If not, considering them might be a crucial step forward in securing your systems.
What next?
As consultative researchers in B2B technology, we’re here to help shape your research projects. Whether you’re looking to gauge market insights or create compelling marketing narratives, we are ready to assist.
If you’re interested in exploring the world of identity and access management further, we can set up an in-depth study for you. Alternatively, if you appreciated the insights and want to explore a different topic, just let us know!
For more client case studies around market insight and dual methodology, please see the following reports:
- How market research can help steer through uncertainty – Vanson Bourne
- Dual methodology: The Mind of the CISO 2023 Report | Trellix
- Dual methodology: 2023 Annual Global Supply Chain Survey – Interos




