Laser Focus World is an industry bedrock—first published in 1965 and still going strong. We publish original articles about cutting-edge advances in lasers, optics, photonics, sensors, and quantum technologies, as well as test and measurement, and the shift currently underway to usher in the photonic integrated circuits, optical interconnects, and copackaged electronics and photonics to deliver the speed and efficiency essential for data centers of the future.

Our 80,000 qualified print subscribers—and 130,000 12-month engaged online audience—trust us to dive in and provide original journalism you won’t find elsewhere covering key emerging areas such as laser-driven inertial confinement fusion, lasers in space, integrated photonics, chipscale lasers, LiDAR, metasurfaces, high-energy laser weaponry, photonic crystals, and quantum computing/sensors/communications. We cover the innovations driving these markets.

Laser Focus World is part of Endeavor Business Media, a division of EndeavorB2B.

Laser Focus World Membership

Never miss any articles, videos, podcasts, or webinars by signing up for membership access to Laser Focus World online. You can manage your preferences all in one place—and provide our editorial team with your valued feedback.

Magazine Subscription

Can you subscribe to receive our print issue for free? Yes, you sure can!

Newsletter Subscription

Laser Focus World newsletter subscription is free to qualified professionals:

The Daily Beam

Showcases the newest content from Laser Focus World, including photonics- and optics-based applications, components, research, and trends. (Daily)

Product Watch

The latest in products within the photonics industry. (9x per year)

Bio & Life Sciences Product Watch

The latest in products within the biophotonics industry. (4x per year)

Laser Processing Product Watch

The latest in products within the laser processing industry. (3x per year)

Get Published!

If you’d like to write an article for us, reach out with a short pitch to Sally Cole Johnson: [email protected]. We love to hear from you.

Photonics Hot List

Laser Focus World produces a video newscast that gives a peek into what’s happening in the world of photonics.

Following the Photons: A Photonics Podcast

Following the Photons: A Photonics Podcast dives deep into the fascinating world of photonics. Our weekly episodes feature interviews and discussions with industry and research experts, providing valuable perspectives on the issues, technologies, and trends shaping the photonics community.

Editorial Advisory Board

  • Professor Andrea M. Armani, University of Southern California
  • Ruti Ben-Shlomi, Ph.D., LightSolver
  • James Butler, Ph.D., Hamamatsu
  • Natalie Fardian-Melamed, Ph.D., Columbia University
  • Justin Sigley, Ph.D., AmeriCOM
  • Professor Birgit Stiller, Max Planck Institute for the Science of Light, and Leibniz University of Hannover
  • Professor Stephen Sweeney, University of Glasgow
  • Mohan Wang, Ph.D., University of Oxford
  • Professor Xuchen Wang, Harbin Engineering University
  • Professor Stefan Witte, Delft University of Technology

Survey: 92% of Global Organizations Indicate Identity Security as Critical for a Robust Zero Trust Implementation

CyberArk Introduces Peer-Based Framework for Evaluating and Maturing Identity Security Strategies

CyberArk (NASDAQ: CYBR), the global leader in Identity Security, today announced findings of a global survey that explores trends in Identity Security adoption and the relative maturity of organizations embarking on related strategies. Results show that only 9% of organizations are taking an agile, holistic and mature approach to securing identities throughout their hybrid and multi-cloud environments. The report features an Identity Security maturity model to help cybersecurity leaders assess their current strategies, uncover risks and take steps to strengthen cyber resilience.

Experts Recognize Identity Security as Critical Path for Cyber Resilience

“The Holistic Identity Security Maturity Model: Raising the Bar for Cyber Resilience”1 report features results from a survey of 1,500 cybersecurity professionals conducted by CyberArk and Enterprise Strategy Group (ESG). Based on the global survey, the data-driven model identifies 9% of organizations as those with the most mature and holistic Identity Security strategies. These Transformative organizations have a well-rounded focus on implementing Identity Security tools, are inherently agile and display a “fail fast, learn faster” characteristic even in times of a successful cybersecurity attack. 42% of all respondents’ Identity Security programs, however, are in the earliest stage of maturity and lack foundational tools and integrations to quickly mitigate identity-related risk. An expanding identity attack surface, IT complexity and several organizational roadblocks contribute to this widespread Identity Security deficit. Notable findings include:

  • Strategy and Outcome Gap: 69% of C-level executives believe they are making correct Identity Security-related decisions compared to 52% of all other personnel (technical decision makers and practitioners). The gap highlights the perception that overall security can be achieved by making the right technology investments. But that is only part of the story. Strategically maximizing those investments to include implementation and integration with existing environments, breaking down silos and improved training are equally important.
  • Disparate Endpoint Data: 92% of respondents believe that endpoint security or device trust and identity management are essential to a robust Zero Trust strategy, and 65% believe the ability to correlate data is critical for effectively securing endpoints.
  • Fragmented Efforts: 58% of organizations have two teams responsible for securing identities in the cloud and on-premises and rely on numerous point solutions, making it difficult to understand their real-time security posture.

“This research uncovers the relationship between a strong Identity Security strategy and enhanced business outcomes,” said Jack Poller, senior analyst, Enterprise Strategy Group (ESG). “More frequent and timely maturity assessments can help ensure the right users have access to the right data, and that organizations can act quickly enough to stop threats before they stop business.”

A Peer-Based Framework for Security Experts to Mature Holistic Identity Security Strategies

Drawing from these data-based peer insights, the Holistic Identity Security Maturity Model framework is designed to help organizations evaluate their maturity across four tenets of Identity Security:

  • Procurement of tools spanning management, privilege controls, governance, authentication and authorization for all identities and identity types.
  • Integrations with other IT and security solutions within the organization’s stack to secure access to all corporate assets and environments.
  • Automation to help ensure continuous compliance with policies, industry standards and regulations, along with rapid response to high-volume routine and anomalous events.
  • Continuous threat detection and response capabilities based on a solid understanding of identity behaviors and organizational policies.

“While 63% of organizations admit to being a victim of identity-based attacks, this percentage is likely much higher as adversaries continue to successfully target and compromise identities at scale,” said Amita Potnis, director, thought leadership marketing, CyberArk. "The main focus for organizations looking to adopt a mature holistic Identity Security strategy is to secure access for all identities - human and machine - by breaking down silos and adopting a consolidated and automated approach for Identity Security. Our research indicates that many have already begun investing in this journey, with 24% of organizations committing more than 10% of their overall cybersecurity budget to their Identity Security programs this year."

Transformative organizations, which account for 9% of the total respondent base, have reached the pinnacle of maturity having embraced a unified approach to Identity Security. The CyberArk Identity Security Platform embodies this approach, applying intelligent privilege controls to all identities – human and machine – with continuous threat detection and prevention across the entire identity lifecycle. With CyberArk, organizations can enable Zero Trust and least privilege with complete visibility, ensuring that every identity can securely access any resource, located anywhere, from everywhere.

To access the full survey and framework, download the report: https://www.cyberark.com/resources/analyst-reports/the-holistic-identity-security-maturity-model

Survey Methodology

The Enterprise Strategy Group (ESG) conducted a survey of 1,500 IT and security decision-makers in the third quarter of 2022. All respondents operated in a multi-cloud environment and were knowledgeable about their organization’s identity and access management strategies and capabilities. They were based in North America (US, Canada), Latin America (Mexico, Brazil), EMEA (Israel, Germany, UK, Spain, Italy, Netherlands) and APJ (Australia, Hong Kong, India, Japan, Singapore, Taiwan).

1 – Enterprise Strategy Group, “The Holistic Identity Security Maturity Model: Raising the Bar for Cyber Resilience,” February 2023 by Jack Poller

About CyberArk

CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArk, LinkedIn or Facebook.

Copyright© 2023 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.