Analyst Report

IDC APAC Cybersecurity, An Opportunity to Engender Trust

The value of identity in the digital environment.

This IDC article looks at identity management in reframing APAC cyber security as an opportunity for Asia/Pacific businesses to gain a distinct advantage, especially amid uncertain times.


In the face of the new normal CEOs’ new mandate in the digital economy: TRUST

Engendering trust, defining new value, and ensuring reliable digital services and experiences rank highest in importance to the overall business vision. Respondents were asked to rank their strategic business priorities, with 1 being the least important and 5 being the most important.


Remote working as part of the future of work

Remote working is no longer a nice-to-have but a critical element of business resiliency and continuity plans, and for many, may become business as usual.

  • 60% of Asia/Pacific employees surveyed want remote access, but only 40% have it.
  • 40% of Asia/Pacific respondents in banking and financial services cited productivity gains due to remote access.

Key security challenges

Security resource issues

30% of Asia/Pacific organisations suffer from a lack of skills to ensure reliable and secure digital services. The talent shortage is more critical in Singapore, while Australia and New Zealand are in line with the regional average.

  • Asia/Pacific average: 30%
  • Singapore average: 55.6%
  • Australia average: 33.2%
  • New Zealand average: 33%
Insufficient security management focus:
  • 10% of organizations have a dedicated chief information security officer (CSO or CISO).
  • 80% of organisations assign the head of IT (CIO or IT director) as the head of security.
IAM headcount

Enterprises with at least 500+ employees surveyed by IDC have an average of 23 full-time employees in the IT security department, with more resources focused on IAM than any other area of IT security.

Percentage of time spent by security role:

  • Identity management: 29.1%
  • Threat management: 24.7%
  • Trust management: 23.4%
  • Vulnerable management: 22.8%

Considering the importance of threat identification, the ability to transfer valuable resources by improving IAM efficiencies would be considered a strategic move.

Looming identity crisis

Businesses are still warming up to MFA and federation for enhanced security.

  • 23.4% of Asia/Pacific organisations plan to deploy MFA for all users accessing sensitive data.
  • 30.4% of Asia/Pacific organisations are considering or piloting identity federation plans.
  • 29.1% Disconcertingly, 29.1% surveyed are not even considering federation.
Remote working is here to stay

Business and IT leaders must address the security changes head on:

  • Control over corporate network access from employees’ managed and unmanaged devices.
  • Addressing the complexities of authentication and compliance.
  • Adopting a strong cyber risk governance practice.

Building a trust agenda through trusted identities

Today’s boardroom agenda calls for a prioritisation on driving security, specifically identity.

Strategic investment in IAM is one way to address many of these issues, particularly where users and identities are validated and monitored.

Top 5 challenges for 2020–2021:
  • Increasingly sophisticated external cyber threats: 37.9%
  • Legacy IT architecture and technology: 32.4%
  • Quantifying/measuring the business benefits of improving trust scores: 31.7%
  • Increasing regulatory compliance requirements: 29.0%
  • Significant support required for vendor partners ecosystem: 19.3%
Future of trust: top goals for 2020-2021

Identity as an enabler for corporate strategies

Identity driver #1

Optimised user/customer experience

Identity driver #2

Managing identity at digital scale to enable digital transformation

Identity driver #3

Propagating compliance without sacrificing usability

Identity driver #4

Integrating identity to support operational excellence

Identity driver #5

Managing enterprise risk through trusted identity

Building a trust agenda with the board

Security as the foundation
  • Identity, along with applications and data, are emerging as the new control points.
  • Ensuring data privacy is about who has access to what data, and in today’s environment, from where.
  • Data security is a key control point as it relates to both compliance and trustworthiness.
Changing models of IAM solutions
  • Move away from single solution deployments.
  • Look for a more consolidated suite of services that integrate seamlessly with other vendors.
  • Multi-factor authentication, password management, and single sign-on, used in combination, offer a much- needed level of control and visibility.
The right tools
  • Solutions with improved ease of use and greater automation help reduce time spent on user access requests and identity management to ensure better use of security resources elsewhere.
  • Refocus staff to other critical security roles such as threat identification and remediation.
  • IDC forecasts that cloud-based IAM will grow nearly 3 times as fast as on-premises IAM by 2023.


IDC InfoBrief, Sponsored by LogMeIn, The Value of Identity in The Digital Environment, May 2020

Copyright 2020 IDC. Reproduction without written permission is forbidden. This IDC Infographic was produced by IDC Asia/Pacific Custom Solutions. The opinion, analysis, and research results presented herein are drawn from more detailed research and analysis independently conducted and published by IDC. Any information or reference to IDC that is to be used in advertising, press releases or promotional materials requires prior written approval. For more information, visit: or email:

Learn More

View as an Infographic

Download this information as an infographic.

Download this Infographic

Request a Demo

See how password management can secure your business.

Request a Demo

LastPass for Business

Improve security, reduce the risk of data breaches, maintain convenience.

Explore LastPass Business

LastPass Resource Center

All you need to improve security in one password management solution.

Go to Resource Center

Are you ready to elevate the security conversation to a business one?