Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking and Finance Review - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2026 GBAF Publications Ltd - All Rights Reserved. | Sitemap | Tags | Developed By eCorpIT

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > BeyondTrust Survey Reveals Five Keys to Secure DevOps, Cloud, and IoT Adoption
    Technology

    BeyondTrust Survey Reveals Five Keys to Secure DevOps, Cloud, and IoT Adoption

    Published by Gbaf News

    Posted on June 8, 2018

    11 min read

    Last updated: January 21, 2026

    This image depicts Mike Ashley, founder of Frasers, who recently failed to win a seat on the Boohoo board. This development comes as the Bank of Japan maintains steady interest rates, highlighting the ongoing economic challenges in the finance sector.
    Mike Ashley, founder of Frasers, fails to secure a position on the Boohoo board - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Tags:BeyondTrustDevOps

    82 percent of respondents say that privileged access management facilitates the move to next-generation technologies

    BeyondTrust, the leading cybersecurity company dedicated to preventing privilege misuse and stopping unauthorized access, today announced the results of the 2018 Implications of Using Privileged Access Management to Enable Next-Generation Technology Survey. The survey shows that 90 percent of enterprises are engaged with at least one next-generation technology (NGT), such as cloud, IoT, or AI. Yet, while enterprises are optimistic about the business benefits these technologies can bring, they also have concerns about the risks, with 78 percent citing the security risks of NGTs as somewhat to extremely large. One in five respondents experienced five or more breaches related to NGTs. Excessive user privileges were implicated in 52 percent of breaches.

    It is an exciting time for IT. Next-generation, transformative technologies such as AI/Machine Learning and IoT, and business processes like DevOps are leading the way to a bright future full of operational efficiencies, greater business agility, and cost savings. Yet, there is also a dark side to these NGTs: security vulnerabilities.

    To better understand how security issues, such as privileged access management (PAM), affect the adoption of NGTs, BeyondTrust – the leader in PAM – surveyed 612 IT professionals. The results are a wake-up call for anyone looking to leverage these NGTs.

    DevOps has Reached Mainstream; AI and IoT Not Far Behind

    Morey Haber, CTO, BeyondTrust

    Morey Haber, CTO, BeyondTrust

    The survey found broad interest in NGTs, with the most common being DigitalTransformation (DX), DevOps and IoT.  IT reports these NGTs are important for organizations, with 63 percent saying Digital Transformation (DX) will have a somewhat to extremely large impact on their organization, followed by DevOps (50 percent), AI (42 percent), and IoT (40 percent).

    Significant Movement Toward the Cloud

    The survey also found that cloud transformation is accelerating.  Respondents indicate that today, 62 percent of workloads are on-premises, with 15 percent in a public cloud, 11 percent in private clouds, and 8 percent in SaaS applications. Over the next three years, that is projected to dramatically change—on-premises drops to 44 percent, public cloud jumps to 26 percent, private cloud increases to 15 percent, and SaaS increases to 12 percent.

    One in Five Respondents Experienced Five or More Breaches Related to NGTs

    Security issues, as a result of NGTs, happen at an alarming rate. Eighteen percent of respondents indicated they had a breach related to NGTs in the last 24 months that resulted in data loss, 20 percent experienced a breach that resulted in an outage, and 25 percent saw breaches over that time period that triggered a compliance event. One in five survey respondents experienced 5 or more breaches.

    Too Much Privilege Results in Breaches

    The study shows that, more than half the time, these breaches occur due to trusted users doing inappropriate things for innocent reasons, with 13 percent of respondents indicating it happens “often” or “all the time.” In 18 percent of the cases, it’s trusted insiders going rogue, and in 15 percent of the cases, its outsiders gaining privileged access to steal credentials. In each case, excessive privileges are to blame.

    There are real business costs that result from breaches. The top costs are lost productivity, loss of reputation, monetary damages, and compliance penalties.

    Privileged Access Management Can Facilitate the Move to NGTs

    Respondents overwhelmingly indicate that PAM-related capabilities can improve security and facilitate a move to NGTs. Top practices include controlling and governing privileged and other shared accounts (60 percent, 59 percent, respectively), enforcing appropriate credential usage (59 percent), and creating and enforcing rigorous password policies (55 percent). In fact, 100 percent of the survey respondents say they are employing at least one PAM-related best practice to avoid NGT problems with privileged access.

    How Privileged Access Management Can Enable the Transformation to Next-Generation Technologies

    To improve security while reaping the transformative benefits that NGTs offer, organizations should implement five privileged access management (PAM) best practices that address use cases from on-prem to cloud.

    • Best Practice #1: Discover and inventory all privileged accounts and assets. Organizations should perform continuous discovery and inventory of everything from privileged accounts to container instances and libraries across physical, virtual, and cloud environments.
    • Best Practice #2: Scan for vulnerabilities and configuration compliance. For DevOps and cloud use cases, organizations should scan both online and offline container instances and libraries for image integrity.
    • Best Practice #3: Manage shared secrets and hard-coded passwords. Governing and controlling shared and other privileged accounts represents one of the most important tactics organizations can employ to limit the effects of data breaches resulting from NGTs.
    • Best Practice #4: Enforce least privilege and appropriate credential usage. Organizations should only grant required permissions to appropriate build machines and images through least privilege enforcement.
    • Best Practice #5: Segment networks. Especially important in DevOps, lateral movement protection should be zone-based and needs to cover the movement between development, QA, and production systems.

    “It is encouraging to see that organizations understand the benefits that Privileged Access Management can deliver in protecting next-generation technologies, but there are more best practices to employ,” said Morey Haber, Chief Technology Officer at BeyondTrust. “The survey affirms that security should be at the forefront of new technology initiatives, otherwise, organizations can experience serious financial, compliance, and technological ramifications later on.” 

    Photo Caption: Morey Haber, CTO, BeyondTrust 

    Top of Form 1About BeyondTrust

    BeyondTrust is a global information security software company that helps organizations prevent cyber attacks and unauthorized data access due to privilege abuse. Our solutions give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Access Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com.

    Follow BeyondTrust

    PowerBroker for Networks Datasheet

    Twitter: http://twitter.com/beyondtrust
    Blog: www.beyondtrust.com/blog
    LinkedIn: http://www.linkedin.com/companies/beyondtrust
    Facebook: http://www.facebook.com/beyondtrust

    82 percent of respondents say that privileged access management facilitates the move to next-generation technologies

    BeyondTrust, the leading cybersecurity company dedicated to preventing privilege misuse and stopping unauthorized access, today announced the results of the 2018 Implications of Using Privileged Access Management to Enable Next-Generation Technology Survey. The survey shows that 90 percent of enterprises are engaged with at least one next-generation technology (NGT), such as cloud, IoT, or AI. Yet, while enterprises are optimistic about the business benefits these technologies can bring, they also have concerns about the risks, with 78 percent citing the security risks of NGTs as somewhat to extremely large. One in five respondents experienced five or more breaches related to NGTs. Excessive user privileges were implicated in 52 percent of breaches.

    It is an exciting time for IT. Next-generation, transformative technologies such as AI/Machine Learning and IoT, and business processes like DevOps are leading the way to a bright future full of operational efficiencies, greater business agility, and cost savings. Yet, there is also a dark side to these NGTs: security vulnerabilities.

    To better understand how security issues, such as privileged access management (PAM), affect the adoption of NGTs, BeyondTrust – the leader in PAM – surveyed 612 IT professionals. The results are a wake-up call for anyone looking to leverage these NGTs.

    DevOps has Reached Mainstream; AI and IoT Not Far Behind

    Morey Haber, CTO, BeyondTrust

    Morey Haber, CTO, BeyondTrust

    The survey found broad interest in NGTs, with the most common being DigitalTransformation (DX), DevOps and IoT.  IT reports these NGTs are important for organizations, with 63 percent saying Digital Transformation (DX) will have a somewhat to extremely large impact on their organization, followed by DevOps (50 percent), AI (42 percent), and IoT (40 percent).

    Significant Movement Toward the Cloud

    The survey also found that cloud transformation is accelerating.  Respondents indicate that today, 62 percent of workloads are on-premises, with 15 percent in a public cloud, 11 percent in private clouds, and 8 percent in SaaS applications. Over the next three years, that is projected to dramatically change—on-premises drops to 44 percent, public cloud jumps to 26 percent, private cloud increases to 15 percent, and SaaS increases to 12 percent.

    One in Five Respondents Experienced Five or More Breaches Related to NGTs

    Security issues, as a result of NGTs, happen at an alarming rate. Eighteen percent of respondents indicated they had a breach related to NGTs in the last 24 months that resulted in data loss, 20 percent experienced a breach that resulted in an outage, and 25 percent saw breaches over that time period that triggered a compliance event. One in five survey respondents experienced 5 or more breaches.

    Too Much Privilege Results in Breaches

    The study shows that, more than half the time, these breaches occur due to trusted users doing inappropriate things for innocent reasons, with 13 percent of respondents indicating it happens “often” or “all the time.” In 18 percent of the cases, it’s trusted insiders going rogue, and in 15 percent of the cases, its outsiders gaining privileged access to steal credentials. In each case, excessive privileges are to blame.

    There are real business costs that result from breaches. The top costs are lost productivity, loss of reputation, monetary damages, and compliance penalties.

    Privileged Access Management Can Facilitate the Move to NGTs

    Respondents overwhelmingly indicate that PAM-related capabilities can improve security and facilitate a move to NGTs. Top practices include controlling and governing privileged and other shared accounts (60 percent, 59 percent, respectively), enforcing appropriate credential usage (59 percent), and creating and enforcing rigorous password policies (55 percent). In fact, 100 percent of the survey respondents say they are employing at least one PAM-related best practice to avoid NGT problems with privileged access.

    How Privileged Access Management Can Enable the Transformation to Next-Generation Technologies

    To improve security while reaping the transformative benefits that NGTs offer, organizations should implement five privileged access management (PAM) best practices that address use cases from on-prem to cloud.

    • Best Practice #1: Discover and inventory all privileged accounts and assets. Organizations should perform continuous discovery and inventory of everything from privileged accounts to container instances and libraries across physical, virtual, and cloud environments.
    • Best Practice #2: Scan for vulnerabilities and configuration compliance. For DevOps and cloud use cases, organizations should scan both online and offline container instances and libraries for image integrity.
    • Best Practice #3: Manage shared secrets and hard-coded passwords. Governing and controlling shared and other privileged accounts represents one of the most important tactics organizations can employ to limit the effects of data breaches resulting from NGTs.
    • Best Practice #4: Enforce least privilege and appropriate credential usage. Organizations should only grant required permissions to appropriate build machines and images through least privilege enforcement.
    • Best Practice #5: Segment networks. Especially important in DevOps, lateral movement protection should be zone-based and needs to cover the movement between development, QA, and production systems.

    “It is encouraging to see that organizations understand the benefits that Privileged Access Management can deliver in protecting next-generation technologies, but there are more best practices to employ,” said Morey Haber, Chief Technology Officer at BeyondTrust. “The survey affirms that security should be at the forefront of new technology initiatives, otherwise, organizations can experience serious financial, compliance, and technological ramifications later on.” 

    Photo Caption: Morey Haber, CTO, BeyondTrust 

    Top of Form 1About BeyondTrust

    BeyondTrust is a global information security software company that helps organizations prevent cyber attacks and unauthorized data access due to privilege abuse. Our solutions give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Access Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your company goes. BeyondTrust’s security solutions are trusted by over 4,000 customers worldwide, including half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com.

    Follow BeyondTrust

    PowerBroker for Networks Datasheet

    Twitter: http://twitter.com/beyondtrust
    Blog: www.beyondtrust.com/blog
    LinkedIn: http://www.linkedin.com/companies/beyondtrust
    Facebook: http://www.facebook.com/beyondtrust

    More from Technology

    Explore more articles in the Technology category

    Image for Engineering Trust in the Age of Data: A Blueprint for Global Resilience
    Engineering Trust in the Age of Data: A Blueprint for Global Resilience
    Image for Over half of organisations predict their OT environments will be targeted by cyber attacks
    Over half of organisations predict their OT environments will be targeted by cyber attacks
    Image for Engineering Financial Innovation in Renewable Energy and Climate Technology
    Engineering Financial Innovation in Renewable Energy and Climate Technology
    Image for Industry 4.0 in 2025: Trends Shaping the New Industrial Reality
    Industry 4.0 in 2025: Trends Shaping the New Industrial Reality
    Image for Engineering Tomorrow’s Cities: On a Mission to Build Smarter, Safer, and Greener Mobility
    Engineering Tomorrow’s Cities: On a Mission to Build Smarter, Safer, and Greener Mobility
    Image for In Conversation with Faiz Khan: Architecting Enterprise Solutions at Scale
    In Conversation with Faiz Khan: Architecting Enterprise Solutions at Scale
    Image for Ballerine Launches Trusted Agentic Commerce Governance Platform
    Ballerine Launches Trusted Agentic Commerce Governance Platform
    Image for Maximising Corporate Visibility in a Digitally Driven Investment Landscape
    Maximising Corporate Visibility in a Digitally Driven Investment Landscape
    Image for The Digital Transformation of Small Business Lending: How Technology is Reshaping Credit Access
    The Digital Transformation of Small Business Lending: How Technology is Reshaping Credit Access
    Image for Navigating Data and AI Challenges in Payments: Expert Analysis by Himanshu Shah
    Navigating Data and AI Challenges in Payments: Expert Analysis by Himanshu Shah
    Image for Unified Namespace: A Practical 5-Step Approach to Scalable Data Architecture in Manufacturing
    Unified Namespace: A Practical 5-Step Approach to Scalable Data Architecture in Manufacturing
    Image for Designing AI Agents That Don’t Misbehave
    Designing AI Agents That Don’t Misbehave
    View All Technology Posts
    Previous Technology PostFinancial services need to adopt biometric authentication, and fast
    Next Technology PostTechnology in the Blockchain Market is Expected to Grow