Protected: Key Findings: Privileged Access and the Impact of Pass the Hash Attacks

A Global Survey of IT Security Professionals

Goals and Methodology

  • Research Goals: The goal of this survey was to capture hard data on current experiences, trends and approaches to Identity Governance and Administration (IGA), Privileged Access Management (PAM) and account management and Identity SaaS.
  • Methodology: An online survey was sent to global sources of IT security professionals. Questions were asked to explore the impact of Pass the Hash attacks.
  • Participants: A total of 1,005 qualified individuals completed the survey. All participants had direct responsibility for IT security and were very knowledgeable about the IAM and privileged access approach at their company. A wide range of industries, countries, and company sizes were represented.


We use cookies to optimize your experience, enhance site navigation, analyze site usage, assist in our marketing efforts. Privacy Policy