9 min read

82% of Businesses Hit by Identity Issues: Survey Insights

AI

ThinkTools Team

AI Research Lead

Introduction

Customer identity and access management (CIAM) has become a critical battleground for modern enterprises. In an era where digital experiences are the primary touchpoint between a brand and its audience, the ability to authenticate, authorize, and manage user identities is no longer a peripheral concern—it is a core competitive advantage. Yet, a recent third‑party survey commissioned by Descope, a drag‑and‑drop external identity‑and‑access‑management (IAM) platform, paints a stark picture: 82 % of businesses report significant pain points related to customer identity. These challenges range from the ubiquitous password fatigue that plagues both users and IT teams to the chronic overload of developers tasked with building and maintaining bespoke authentication flows. The survey, which gathered responses from 416 decision makers with technical and budgetary authority, reveals a CIAM landscape in flux, where traditional approaches are giving way to more modular, user‑centric solutions.

The implications of these findings are far‑reaching. For marketers, a frictionless login experience can be the difference between a conversion and a cart abandonment. For security teams, weak or inconsistent identity controls expose organizations to credential‑stuffing attacks, phishing, and regulatory non‑compliance. For product managers, the cost of building and iterating on custom authentication systems can divert resources from core product innovation. In this post, we dive deep into the survey’s insights, unpack the root causes of the identity crisis, examine the emerging drag‑and‑drop IAM paradigm, and outline actionable strategies for businesses looking to turn identity challenges into strategic assets.

The Scale of the Problem

The headline figure—82 % of businesses experiencing customer identity issues—speaks volumes about the ubiquity of the problem. It is not an isolated incident affecting niche sectors; rather, it cuts across industries, company sizes, and geographic regions. The survey’s breadth, covering a diverse cohort of decision makers, lends credibility to the claim that identity friction is a systemic issue. When businesses report identity problems, they are often referring to a combination of user‑experience bottlenecks, security vulnerabilities, and operational inefficiencies.

One of the most common manifestations of this friction is the persistent reliance on passwords. Despite the proliferation of password‑less authentication methods—biometrics, magic links, and hardware tokens—many organizations still default to traditional password mechanisms. The result is a double‑edged sword: users are forced to remember complex credentials, leading to frequent resets, while IT teams must maintain password policies, enforce rotation, and monitor for breaches.

Beyond passwords, the survey highlights a broader theme: developers are overworked and stretched thin. Building a secure, scalable, and user‑friendly authentication system requires a deep understanding of cryptography, compliance frameworks, and user‑behavior analytics. For many teams, this expertise is scarce, leading to rushed implementations, technical debt, and a higher likelihood of security gaps.

Finally, the term “agentic identity” surfaced in the findings, pointing to a shift in how users interact with identity systems. Users now expect self‑service capabilities—updating personal information, managing permissions, and controlling data sharing—without involving IT. When organizations fail to provide these options, they not only frustrate users but also increase the risk of data mishandling.

Root Causes: Passwords, Developers, and Agentic Identity

Password Fatigue and Security Gaps

Passwords have been the cornerstone of authentication for decades, but they are increasingly ill‑suited to the modern digital ecosystem. The survey indicates that 68 % of respondents cited password fatigue as a primary source of friction. Users, juggling multiple accounts, resort to weak passwords or reuse credentials across sites, creating a fertile ground for credential‑stuffing attacks. Moreover, password reset workflows often involve cumbersome email or SMS verification steps that can deter users from completing the process.

From a security perspective, weak passwords undermine the very purpose of CIAM. Attackers can leverage automated tools to test large dictionaries of common passwords, and once a credential is compromised, lateral movement within the organization becomes easier. The cost of a data breach—both in terms of remediation and reputational damage—can be astronomical, making password fatigue a business risk that cannot be ignored.

Developer Overload and Technical Debt

The survey’s respondents also highlighted developer overload as a significant contributor to identity challenges. Building a robust CIAM solution demands expertise in identity protocols (OAuth 2.0, OpenID Connect), secure token handling, and integration with third‑party services. For many organizations, developers are tasked with building custom authentication flows from scratch, often under tight deadlines and with limited resources.

This approach leads to a cycle of technical debt. Quick fixes, such as hard‑coding credentials or bypassing multi‑factor authentication (MFA) for convenience, create vulnerabilities that can be exploited later. Additionally, the lack of standardized, reusable components means that each new product or feature requires a fresh authentication implementation, multiplying effort and risk.

The Rise of Agentic Identity

Modern users demand agency over their digital identities. They expect to control who can access their data, how it is used, and when it is shared. The survey found that 54 % of respondents recognized the need for self‑service identity management but struggled to implement it effectively. Traditional IAM systems often require IT intervention for every change, from updating a phone number to revoking a third‑party app’s access.

When users cannot exercise agency, they turn to workarounds—such as sharing credentials with colleagues or using insecure personal devices—thereby increasing the attack surface. Moreover, the lack of granular consent mechanisms can lead to compliance violations, especially in regulated industries where data privacy laws mandate explicit user consent.

Survey Methodology and Key Findings

Descope’s survey methodology involved a structured questionnaire distributed to 416 individuals holding technical or budgetary responsibility for CIAM across various sectors. Respondents were asked to rate the severity of identity challenges, identify root causes, and evaluate the effectiveness of current solutions. The survey also incorporated open‑ended questions to capture qualitative insights.

Key quantitative findings include:

  • 82 % of businesses report identity issues.
  • 68 % attribute friction to password fatigue.
  • 54 % recognize the need for agentic identity but lack implementation.
  • 47 % of developers feel overworked by CIAM responsibilities.

Qualitative responses underscored a growing dissatisfaction with legacy IAM platforms that are rigid, costly, and difficult to scale. Many respondents expressed a desire for modular, low‑code solutions that can be integrated quickly and customized to fit specific business needs.

Implications for Businesses

The survey’s findings carry several implications for organizations across the board. First, the high prevalence of identity issues signals a systemic risk that can erode customer trust and drive revenue loss. A friction‑heavy login flow can cause cart abandonment rates to spike, while security breaches can result in regulatory fines and brand damage.

Second, the developer overload problem suggests that CIAM is becoming a bottleneck for product innovation. When engineering teams spend disproportionate time on authentication, they have less bandwidth to focus on core product features, potentially stalling time‑to‑market.

Third, the shift toward agentic identity highlights an evolving user expectation that businesses must meet or risk losing customers. Companies that fail to provide self‑service identity controls may find themselves outpaced by competitors who offer seamless, privacy‑centric experiences.

Emerging Solutions: Drag‑and‑Drop IAM Platforms

In response to these challenges, a new wave of IAM platforms has emerged that promise to simplify identity management through low‑code, drag‑and‑drop interfaces. Descope, for example, offers a modular platform that allows teams to assemble authentication flows by selecting pre‑built components—such as MFA, social login, or custom consent screens—without writing code.

These platforms bring several advantages. First, they reduce the time required to launch new authentication features from weeks or months to days. Second, they lower the barrier to entry for non‑technical stakeholders, enabling product managers and marketers to prototype identity flows directly. Third, they promote consistency across applications, as the same components can be reused across multiple products, reducing the risk of security gaps.

However, adopting a drag‑and‑drop IAM solution is not a silver bullet. Organizations must still ensure that the platform complies with industry standards, integrates with existing data stores, and supports advanced security controls such as adaptive MFA and anomaly detection. Moreover, governance around data privacy and consent must be built into the platform’s architecture.

Future Outlook

Looking ahead, the CIAM landscape is poised for further transformation. The convergence of identity and privacy regulations—such as GDPR, CCPA, and upcoming AI‑specific frameworks—will push organizations to adopt more transparent and user‑centric identity models. At the same time, the rise of decentralized identity (DID) and verifiable credentials promises to shift control back to users, potentially reducing reliance on centralized IAM vendors.

For businesses, the key to staying ahead lies in embracing modular, secure, and user‑friendly identity solutions while maintaining rigorous governance. By investing in modern IAM platforms that support low‑code development, continuous compliance, and agentic identity, organizations can turn the identity challenge from a liability into a strategic differentiator.

Conclusion

The Descope survey’s revelation that 82 % of businesses grapple with customer identity issues is a wake‑up call for the entire industry. Password fatigue, developer overload, and the demand for agentic identity are not isolated pain points; they are symptoms of a broader shift toward digital experiences that prioritize security, usability, and user empowerment. Traditional, monolithic IAM systems are ill‑suited to this new reality, and the cost of staying on the sidelines is high—both in lost revenue and in reputational damage.

Modern enterprises must recognize that identity is no longer a backend concern; it is a front‑end experience that can make or break customer relationships. By adopting modular, drag‑and‑drop IAM platforms, organizations can accelerate feature delivery, reduce technical debt, and empower users to take control of their identities. In doing so, they not only mitigate risk but also position themselves as leaders in a market where trust and convenience are paramount.

Call to Action

If your organization is still wrestling with cumbersome authentication flows, frequent password resets, or developer bottlenecks, it’s time to re‑evaluate your CIAM strategy. Explore modern, low‑code IAM platforms that let you build secure, scalable, and user‑centric identity experiences without the overhead of custom code. Start by conducting a quick audit of your current authentication pain points, then pilot a drag‑and‑drop solution to see how quickly you can iterate on login flows, MFA, and consent mechanisms. Engage stakeholders across product, security, and compliance to ensure that any new platform aligns with your regulatory obligations and user expectations. By taking decisive action now, you can transform identity from a source of friction into a competitive advantage that drives customer loyalty and operational efficiency.

We value your privacy

We use cookies, including Google Analytics, to improve your experience on our site. By accepting, you agree to our use of these cookies. Learn more