Welcome!

Agile Computing Authors: Yeshim Deniz, Liz McMillan, Pat Romanski, Elizabeth White, Andy Thurai

Blog Feed Post

More enterprises plan to strengthen access security with multi-factor authentication

SafeNet Global Authentication Survey reveals more enterprises to adopt cloud-based authentication and mobile MFA to accommodate an increasingly mobile workforce

CAMBERLEY - May 21, 2014 - Rising security risks, and demand for seamless and secure access across any device, anytime, has triggered greater adoption of authentication solutions, according to new research from SafeNet, Inc., a global leader in data protection. The 2014 Global Annual Authentication Survey found that over one-third of organisations now use multi-factor authentication to provide seamless and secure access across a multitude of devices and locations - an increase from 2013.

The survey results illustrate that more businesses are adopting multi-factor authentication and distributing it across the wider workforce. The findings support a recent 451 Research report[1] which reveals that access control and authentication are the top 'pain points' and priorities for IT departments. With 57 per cent of all data breaches in 2013 the result of malicious outsiders[2], multi-factor authentication reduces the risk of unauthorised users accessing sensitive information, while still ensuring staff can access corporate resources when and how they need them.

Key Findings

  • Clear growth in multi-factor authentication (MFA) adoption:
    • 37 per cent of organisations now use MFA for a majority of employees - up from 30 per cent last year
    • By 2016, 56 per cent of organisations expect the majority of users to rely on multi-factor authentication.
  • Cloud authentication gaining acceptance:
    • 33 per cent of organisations indicated they preferred cloud-based authentication, up from 21 per cent last year - a 50 per cent increase
    • 33 per cent are now open to the cloud for authentication implementations
  • MFA for mobile devices:
    • More than 53 per cent of respondents said users of mobile devices have restricted access to corporate resources.
    • Those using MFA for mobile users, (22 per cent currently) expect usage to grow to 33 per cent by 2016 - an increase of 30 per cent

"It's clear that some IT departments are struggling to keep up with the rapid pace of change caused by new technologies. The danger is that companies are unable to offer staff the full system access they require to perform their job because they don't have the secure authentication in place to allow access. Then there's the fact that almost every other week we hear about a new enterprise being hacked and data potentially leaked. So there is a perpetual battle to keep up with fast-paced advances in technology, and attempts to protect the company and curb security risks," stated Jason Hart, Vice President of Cloud Solutions at SafeNet.

Cost and Budget Priority
The 451 Research report revealed that authentication and identity access management are a top priority for security projects. Yet, interestingly, in the SafeNet Authentication Survey, almost 40 per cent did not know how much their authentication solution costs per user per year, illustrating the lack of awareness over what is most cost-effective for the organisation. The perception that, by not spending extra on multi-factor authentication, the organisation is cost saving could be misleading to those in charge of IT budgeting. In fact, a multi-factor authentication solution aims to reduce authentication costs and improve ease of use.

Cloud vs. On-Premises-based Authentication
The growing demand from employees to connect to the corporate network with their own device has been met with a rise in cloud-based authentication from organisations. This year, 33 per cent of companies indicated that they preferred cloud-based authentication, up from 20 per cent last year.

"Ultimately, enterprises must accept that their staff will find ways to use mobile devices to access corporate data - with or without permission. Instead of preventing access, IT decision-makers need to deploy multi-factor authentication, which can offer the protection of corporate resources, while allowing staff access and maintaining productivity and performance," Hart added.

Authentication from Mobile Devices
When it comes to using strong authentication for mobile devices with access to corporate resources, the majority of responses were grouped at either end of the scale, showing polarised practices. Almost 40 per cent said less than 10 per cent of users are required to use strong authentication, while over 20 per cent suggest that 90-100 per cent of users currently require it. Interestingly, these figures are set to shift significantly, with 33 per cent expecting that 90-100 per cent of users will require strong authentication in the next two years, and only 15 per cent suggest less than 10 per cent, emphasising the growing importance of mobile authentication.

The drive towards mobile authentication is also fuelling a move from hardware- to software-based authentication tokens. The survey revealed that the use of software-based authentication rose from 27 per cent in 2013 to 40 per cent in 2014, with the expectation that this will rise again to 50 per cent in 2016. Conversely, the use of hardware-based authentication dropped from 60 per cent in 2013 to 41 per cent in 2014.

"IT companies are certainly responding to the rise in mobility with increased software-based authentication; however, there appears to be a 'disconnect' between the desire to embrace mobility, and the struggle to keep up with it and protect resources and data from external threats. Furthermore, as adoption of cloud computing grows, better security becomes crucial. Indeed, the cloud offers various benefits for authentication and applications, but without the security to support them, it only increases the threat." Hart concluded.

[1] The enterprise information security organisation in 2014, 451 Research; https://451research.com/report-short?entityId=80256
[2] Breach Level Index Annual Recap, SafeNet: http://breachlevelindex.com/pdf/Breach-Level-Index-Report.pdf

-ENDS-

About the Survey
The research from SafeNet polled more than 350 senior IT decision-makers from around the world—about 29 per cent from the Asia Pacific region; 42 per cent from Europe, Middle East and Africa; and 29 per cent from North America. The report compares data with a corresponding report from 2013. The full report can be found here: http://www.safenet-inc.com/resources/Other/Data_Protection/2014_Authentication_Survey_-_Executive_Summary/

About SafeNet Data Protection Solutions
SafeNet data protection solutions provide multi-layer encryption with centralised key management and storage. SafeNet delivers the comprehensive encryption platforms that enable security professionals to safeguard sensitive data in data centres, virtualised data centres, and private and public clouds.

SafeNet enables customers to encrypt sensitive data at the storage, file, virtual instance, database, and application layer, while managing encryption security policies and encryption keys centrally. In addition, SafeNet supports format-preserving tokenisation for a wide variety of data types. Through this multi-layer approach, SafeNet enables organisations to:

  • Separate administration of systems and applications from the data stored or processed within these infrastructure layers, ensuring privileged users can't see sensitive data.
  • Take advantage of lower cost operational models while consistently enforcing security policies.
  • Centralise encryption management across physical, virtual, and public cloud environments, and efficiently deliver detailed logs and compliance reporting for internal and external auditors.
  • Employ key vaulting and secure cryptographic resources, both in data centre and multi-tenant environments, in order to retain full ownership and control of their encryption service.

With these capabilities, organisations can institute a defense-in-depth strategy that delivers high levels of security for sensitive data, regardless of where it resides—even if there has been a breach of other controls.

SafeNet Authentication Service
SafeNet Authentication Service is a cloud-based authentication solution that allows service providers and enterprises to rapidly introduce authentication-as-a-service to their customers. It also allows them to significantly reduce the cost and complexity associated with offering and implementing strong authentication, and to strengthen their security and compliance posture. This process is simplified through the flexibility and scalability of automated workflows, vendor-agnostic token integrations, and broad APIs. In addition, management capabilities and processes are fully automated and customisable—providing a seamless and enhanced user experience. With no infrastructure required, SafeNet Authentication Service enables a quick migration to a multi-tier and multi-tenant cloud environment, and protects everything from cloud-based and on-premises applications to networks, users, and devices.

About SafeNet, Inc.
Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organisations around the globe. SafeNet's data-centric approach focuses on the protection of high-value information throughout its lifecycle, from the data centre to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments. Learn more about SafeNet on Twitter, LinkedIn, Facebook, YouTube, and Google+.

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

IoT & Smart Cities Stories
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
SYS-CON Events announced today that IoT Global Network has been named “Media Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. The IoT Global Network is a platform where you can connect with industry experts and network across the IoT community to build the successful IoT business of the future.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear these words all day every day... lofty goals but how do we make it real? Add to that, that simply put, people don't like change. But what if we could implement and utilize these enterprise tools in a fast and "Non-Disruptive" way, enabling us to glean insights about our business, identify and reduce exposure, risk and liability, and secure business continuity?