Rethinking identity maturity: Why confidence in your IAM program might be misplaced

With identity related threats intensifying, IAM maturity matters more than ever.

Harley Adams  profile picture
Harley Adams

February 04, 20262 min read

This is a stylized image of 3 trees in various stages of growth representing identity maturity stages.

In today’s digital-first world, identity is no longer a simple gatekeeper—it’s a strategic control plane. Identity and Access Management (IAM) has evolved into a key enabler of enterprise agility, compliance, and resilience. But according to recent research (link below) by CIO/ FoundryCo, sponsored by OpenText, many organizations are unknowingly operating with a false sense of IAM maturity.

While most security and IT leaders describe their IAM programs as “managed” or even “optimized,” the reality is much different. The data reveals that identity-related incidents are frequent, foundational practices remain underused, and integration complexity continues to stall progress.

The illusion of identity maturity

Organizations participating in the study experienced an average of four identity-related incidents in the past year. Despite this, many still believe their IAM efforts are mature. In truth:

  • Only 36% enforce least-privilege access.
  • Just 28% use just-in-time (JIT) access models.
  • A majority struggle with consistent policy enforcement across environments.

This mismatch between perception and reality results in serious security blind spots. Without integrated, policy-driven IAM across the enterprise, risks like privilege creep, toxic entitlement combinations, and lingering access persist, leaving organizations vulnerable to insider threats, audit failures, and ransomware attacks.

Barriers to real progress

The research surfaced three main challenges slowing IAM advancement:

  1. Competing priorities: 53% cite misalignment between IT and security goals.
  2. Integration complexity: 48% say it’s difficult to unify legacy and cloud systems.
  3. Talent shortages: There is a widespread lack of specialized IAM expertise.

These barriers are amplified by the growth of hybrid infrastructure, non-human identities (like bots and service accounts), and the increased use of generative AI—all of which broaden the identity footprint and complicate management.

Why IAM maturity matters now

Identity-related threats are intensifying. Microsoft reports over 600 million identity attacks per day, and 90% of organizations experienced an identity incident in the past year. Meanwhile, regulatory pressure, cloud adoption, and cyber insurance requirements are forcing organizations to modernize their IAM programs—or risk exposure.

I’ll share more in my next blog about how organizations can move from reactive IAM to proactive orchestration, and how OpenText helps enterprises achieve true identity maturity through integrated governance, risk-based access, and continuous identity intelligence.

In the meantime, check out the full paper “The identity maturity curve: How to close gaps and gain value.”

Share this post

Share this post to x. Share to linkedin. Mail to
Harley Adams avatar image

Harley Adams

Harley Adams is the Director of Product Marketing for OpenText™ Identity and Access Management and Data Privacy and Protection portfolios.

See all posts

More from the author

Secure Identity, Smarter Access: What to Expect from IAM at OpenText World 2025

Secure Identity, Smarter Access: What to Expect from IAM at OpenText World 2025

As digital ecosystems grow more complex and AI evolves into a bigger role within your organization, identity will serve as the new control plane for…

November 13, 2025

5 min read

Why you should upgrade to the latest OpenText Identity Manager

Why you should upgrade to the latest OpenText Identity Manager

ACDI is just one of the many reasons you should consider moving to the latest version of OpenText Identity Manager.

October 29, 2025

5 min read

The state of secure information management: Strategies for securing access and protecting sensitive data 

The state of secure information management: Strategies for securing access and protecting sensitive data 

If you’re watching this space, you know we get a little excited about surveys. We’ve done the State of Zero Trust in 2023, the State…

November 27, 2024

2 min read

Stay in the loop!

Receive regular insights, updates, and resources—right in your inbox.