The horizons of identity security

Assess the maturity of your identity security program

Secure & fuel business value by investing in digital identity security

Identity security adoption report cover image

Business value and trust increase when your organisation is protected by a robust identity security program. But a continuously evolving security threat landscape demands constant vigilance and advanced protection. With 90% of organisations experiencing an identity-related incident in the last year, identity security is the critical line of defence to mitigate potentially existential threats to the business.

Horizon Chart

Your journey to identity security maturity

Discover how the right mix of technology adoption and usage can strengthen your identity security strategy. Learn how investing in identity security not only secures your organization but also drives significant business value and operational efficiency.

The Identity Security Adoption Assessment delivers valuable insights for organizations looking to address today’s most pressing challenges.

Take the assessment to:

Identify opportunities

Understand the maturity level of your identity security based on strategy, talent, operating model, and technology capabilities.

Create a business case

Discover how to build a compelling business case that articulates how investments in identity security reduce risk and drive business value.

Peer deep-dive

Learn which capabilities peers are investing in, the coverage of those capabilities, timelines to scale, and typical barriers faced and how to overcome them.

Understanding the Horizons of Identity Security

We surveyed IAM decision makers across the globe and found that companies going through an identity journey generally fall across 5 horizons:

  • At Horizon 1, the lowest maturity, companies lack the strategy and technology to enable digital identities

  • Those at Horizon 2 have adopted some identity technology but still rely heavily on manual processes

  • For organisations at Horizon 3, the identity program has become digitalised, scaled up, and adopted more widely across the company

  • Those at Horizon 4 have automated at scale and use artificial intelligence (AI) to enable digital identities

  • At Horizon 5 is closest to the future of identity – serving as a critical control point in reducing cybersecurity risk and supporting business in next-gen technology innovation

Read more about the Horizons of Identity Security

Resource Card

New! Horizons of Identity Security Report

Learn what's shaping the identity security industry in 2025 and how to drive the most value from your program.

Read the report
Resource asset image

The Horizons of Identity Security

From SailPoint and Accenture: insights into what's shaping identity security in 2024.

Read now
Resource asset image

Horizons of Identity Security, 2022

Discusses in-depth the five horizons of identity security, findings from our inaugural research study, and the key enablers of an identity program.

Read the report