Executive Summary Strong identity and access management (IAM)combined with a modern identity security strategyis the foundation of any organization’s overallsecurity posture. Every transaction made, every become far more complex than anyone could have In this report, we cover some of the most importanttrends that are driving identity security today. Thisexamination extends far beyond looking at the outlookof traditional IAM products and solutions, and delves intostrategies for authorization, entitlements, governance,privileged access management (PAM), and more. This This is no new revelation to chief informationsecurity officers (CISOs) and other cybersecurityleaders. However, in 2025, the challenges of Key takeaways: Identity security is a strong pillar of technology investments today, with most organizations spending Identity security spending is on the rise, with 78% expecting to increase their budgets in the next year. Many organizations are maturing beyond a singular focus on strong authentication, with manyorganizations planning to invest in cloud infrastructure entitlements management (CIEM), identity Detecting and responding to identity threats is the number one priority for organizations as Read on to find out what this means for security and risk programs, and how CISOs and other leadersshould use these insights to shape their identity security strategies in the coming year. Identity is at the forefront of technology We started the survey by asking respondents abouttheir budget plans and investment strategies aroundidentity, both now and in the future. The results systems becomes increasingly complex, necessitatingrobust solutions to prevent unauthorized access, We believe identity is becoming a foundational part ofdigital transformation budgets, driven by the growingadoption of cloud and multi-cloud environments, as Over half of organizations dedicate more than 20% oftheir IT budget to IAM spending today, with one in fourspending over 30%. At first, this may seem like asignificant amount of budget dedicated to identity.However, it’s justified by the critical role that identity In addition, advanced organizations recognize thatthey need to make bigger investments to helpappropriately assign entitlements, authorization, and Most organizations recognize that theserelationships will only grow more complex, requiringgreater efforts in identity management as digitaltransformation continues to accelerate. In fact, 78%of those surveyed expect to increase their identityand access management budgets in the next year.And almost one in three said their budget will increase We speculate that some of the major drivers for increased identity spending include: Ultimately, as organizations broadly modernize theirtechnology infrastructure, they’re also likely spendingmore to pay down technical debt. They’re updatinglegacy identity architectures to account for new The role that identity security plays in anchoringcybersecurity goals in the coming year is also likelydriving increased spending. When we asked respondentshow high or low of a priority identities, related access, The top five priorities reported by those surveyed were: Detecting and responding to identity threats Securing credentials, secrets, and privileged accounts Managing identities and entitlements in the cloud reported that priority identities, relatedaccess, and entitlements are of high Visibility into all identities and levels of access Securing remote work and third-party risk Tackling today’s identity complexities It’s tough for many to plan a way out of that complexitytrap. Buyers encounter a proliferation of securityvendors, a range of identity technologies, and acollection of identity-related definitions by analyststhat’s overwhelming for even the savviestcybersecurity practitioner or leader. And many It’s evident that substantial resources are now beingdirected toward identity investments. But howeffective are these investments in truly reducing risk As we dive deeper into the survey results and thetechnology trends our experts have observed inrecent years, there are signs that organizations areoverspending on duplicative and isolated identity The data reveals that unfocused and siloed spendingoften results in IAM infrastructure becoming acomplex tangle of technical stacks, making it difficultand costly to manage. When asked about the biggest of respondents namedcomplexity of existing The other obstacles are also tied to complexity. Forexample, in the second spot, resistance from usersand stakeholders, which was named by 16%, is often a Nevertheless, after years of digital transformationprojects that require deploying many different typesof SaaS applications and cloud infrastructure,enterprises have been left facing the reality of what The survey revealed that the vast majority—88% oforganizations—are considering consolidating vendorsto streamline their IAM strategy, most of them withinthe next year. As o