SHARE
Facebook X Pinterest WhatsApp

Seeing Too Much

Seeing Too Much 87 percent of respondents say that individuals have too much access to information resources that are not pertinent to their job description Not Fast Enough on Changes 72 percent say they can’t quickly respond to changes in employee access requirements. Falling Behind 52 percent say they can’t keep pace with the number […]

Apr 28, 2010
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

1Seeing Too Much

87 percent of respondents say that individuals have too much access to information resources that are not pertinent to their job description

2Not Fast Enough on Changes

72 percent say they can’t quickly respond to changes in employee access requirements.

3Falling Behind

52 percent say they can’t keep pace with the number of access change requests that come in on a regular basis

4No Policies, No Enforcement

59 percent of organizations don’t have or don’t enforce access governance policies.

5Staffing Issues Hurt Access Compliance

65 percent of respondents report that a lack of IT staff was a key problem in enforcing access compliance policies.

6Not Enough Tech

57 percent of organizations don’t have enough technology to manage and govern end-user access to information resources

7Quality Control Lapses

61 percent don’t check user access requests against security policies before the access is approved and assigned.

8Who’s in Charge?

37 percent of respondents say business unit managers in their organizations are responsible for end-user access requests to information resources.

9Cloudy Skies Ahead

73 percent of respondents say that adoption of cloud-based applications will have a very significant or significant impact on business and end users’ ability to circumvent existing access policies.

Recommended for you...

Report: CISOs Increasingly Positioned as Executive Leaders
Victoria Durgin
Jan 15, 2026
RSAC on LLM Consistency and Cybersecurity Trust
Victoria Durgin
Jan 14, 2026
Mid-Market Businesses Need MDR: DSN on Proactive Security
LevelBlue: VPN Gateways, Social Engineering Drove 2025 Attacks
Luis Millares
Jan 9, 2026
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.