The 2017 Secure Access Threat Report surveyed more than 600 IT and Security professionals with visibility over the processes associated with enabling privileged users and external parties to connect to their systems.

The amount and variety of access that individuals have is expanding and what is considered “privileged” or sensitive for a company is no longer just payment or customer data.