Privacy and Compliance Concerns Hamper Data Access
Privacy and compliance concerns are hurting organizations’ ability to provide timely access to data for their internal users, putting initiatives at risk. According to Immuta’s 2025 State of Data Security report, nearly two-thirds (64%) of data leaders face "significant challenges" getting timely and secure data into the hands of users.
Top Barriers to Data Access
The top barrier facing data leaders in 2025, according to Immuta’s seventh annual data security report, are compliance and privacy, which were cited by 50% of the survey respondents. The presence of data silos and data fragmentation was cited as a top barrier by 45% of respondents, while 39% reported a need to address complex and unscalable data access policies and processes.
Data Access Times
While data access times have actually gone down since the 2024 report, with 37% of respondents saying it takes them at least one week to get access to data after they have requested it, this is still a significant challenge. The report highlights that a third of data leaders say that data users can’t easily find, request, and access data without IT support.
Centralized vs. Federated Approach
When it comes to centralized vs. federated approach to data governance controls, there was a fairly even split, with 44% respondents reporting a centralized approach, 36% a federated approach, and 20% listing "other." Companies that have adopted the data mesh model may be freeing their users to control their own data, but at the price of decentralized control, Immuta warns.
Automation in Data Governance
Automation in data governance can help address some of these concerns. Data marketplaces such as the one that Immuta launched last fall, combine the data catalog experience for exploring data along with the security controls necessary to prevent bad things from happening when users get access to it, and have the potential to meet the seemingly contradictory goals of providing data access and data security at the same time.
Consequences of a Broken Data Access-Security Chain
When the data access-security chain breaks down, there can be downstream consequences to the business. That could come in the form of missed internal goals, lost revenue, and lost collaboration opportunities. Immuta attributes this feeling to "a wide swath of both internal and external regulations" at play in companies.
Conclusion
In conclusion, data access and security are critical components of any organization’s data strategy. While there are challenges to providing timely and secure data access, automation in data governance can help address some of these concerns. By implementing the right data marketplaces and security controls, organizations can provide their users with the data they need while also protecting their sensitive information.
Frequently Asked Questions
Q: What are the top barriers to data access in 2025?
A: Compliance and privacy, data silos and data fragmentation, complex and unscalable data access policies and processes.
Q: How long does it take for data leaders to get access to data after requesting it?
A: According to Immuta’s report, it takes at least one week for 37% of respondents.
Q: What is the difference between centralized and federated approach to data governance controls?
A: Centralized approach is when data governance is controlled by a single entity, while federated approach is when data governance is controlled by multiple entities.
Q: Can automation in data governance help address data access and security concerns?
A: Yes, automation in data governance can help address data access and security concerns by providing the right data marketplaces and security controls.

