|By RealWire News Distribution||
|May 21, 2014 07:43 AM EDT||
SafeNet Global Authentication Survey reveals more enterprises to adopt cloud-based authentication and mobile MFA to accommodate an increasingly mobile workforce
CAMBERLEY - May 21, 2014 - Rising security risks, and demand for seamless and secure access across any device, anytime, has triggered greater adoption of authentication solutions, according to new research from SafeNet, Inc., a global leader in data protection. The 2014 Global Annual Authentication Survey found that over one-third of organisations now use multi-factor authentication to provide seamless and secure access across a multitude of devices and locations - an increase from 2013.
The survey results illustrate that more businesses are adopting multi-factor authentication and distributing it across the wider workforce. The findings support a recent 451 Research report which reveals that access control and authentication are the top 'pain points' and priorities for IT departments. With 57 per cent of all data breaches in 2013 the result of malicious outsiders, multi-factor authentication reduces the risk of unauthorised users accessing sensitive information, while still ensuring staff can access corporate resources when and how they need them.
- Clear growth in multi-factor authentication (MFA) adoption:
- 37 per cent of organisations now use MFA for a majority of employees - up from 30 per cent last year
- By 2016, 56 per cent of organisations expect the majority of users to rely on multi-factor authentication.
- Cloud authentication gaining acceptance:
- 33 per cent of organisations indicated they preferred cloud-based authentication, up from 21 per cent last year - a 50 per cent increase
- 33 per cent are now open to the cloud for authentication implementations
- MFA for mobile devices:
- More than 53 per cent of respondents said users of mobile devices have restricted access to corporate resources.
- Those using MFA for mobile users, (22 per cent currently) expect usage to grow to 33 per cent by 2016 - an increase of 30 per cent
"It's clear that some IT departments are struggling to keep up with the rapid pace of change caused by new technologies. The danger is that companies are unable to offer staff the full system access they require to perform their job because they don't have the secure authentication in place to allow access. Then there's the fact that almost every other week we hear about a new enterprise being hacked and data potentially leaked. So there is a perpetual battle to keep up with fast-paced advances in technology, and attempts to protect the company and curb security risks," stated Jason Hart, Vice President of Cloud Solutions at SafeNet.
Cost and Budget Priority
The 451 Research report revealed that authentication and identity access management are a top priority for security projects. Yet, interestingly, in the SafeNet Authentication Survey, almost 40 per cent did not know how much their authentication solution costs per user per year, illustrating the lack of awareness over what is most cost-effective for the organisation. The perception that, by not spending extra on multi-factor authentication, the organisation is cost saving could be misleading to those in charge of IT budgeting. In fact, a multi-factor authentication solution aims to reduce authentication costs and improve ease of use.
Cloud vs. On-Premises-based Authentication
The growing demand from employees to connect to the corporate network with their own device has been met with a rise in cloud-based authentication from organisations. This year, 33 per cent of companies indicated that they preferred cloud-based authentication, up from 20 per cent last year.
"Ultimately, enterprises must accept that their staff will find ways to use mobile devices to access corporate data - with or without permission. Instead of preventing access, IT decision-makers need to deploy multi-factor authentication, which can offer the protection of corporate resources, while allowing staff access and maintaining productivity and performance," Hart added.
Authentication from Mobile Devices
When it comes to using strong authentication for mobile devices with access to corporate resources, the majority of responses were grouped at either end of the scale, showing polarised practices. Almost 40 per cent said less than 10 per cent of users are required to use strong authentication, while over 20 per cent suggest that 90-100 per cent of users currently require it. Interestingly, these figures are set to shift significantly, with 33 per cent expecting that 90-100 per cent of users will require strong authentication in the next two years, and only 15 per cent suggest less than 10 per cent, emphasising the growing importance of mobile authentication.
The drive towards mobile authentication is also fuelling a move from hardware- to software-based authentication tokens. The survey revealed that the use of software-based authentication rose from 27 per cent in 2013 to 40 per cent in 2014, with the expectation that this will rise again to 50 per cent in 2016. Conversely, the use of hardware-based authentication dropped from 60 per cent in 2013 to 41 per cent in 2014.
"IT companies are certainly responding to the rise in mobility with increased software-based authentication; however, there appears to be a 'disconnect' between the desire to embrace mobility, and the struggle to keep up with it and protect resources and data from external threats. Furthermore, as adoption of cloud computing grows, better security becomes crucial. Indeed, the cloud offers various benefits for authentication and applications, but without the security to support them, it only increases the threat." Hart concluded.
 The enterprise information security organisation in 2014, 451 Research; https://451research.com/report-short?entityId=80256
 Breach Level Index Annual Recap, SafeNet: http://breachlevelindex.com/pdf/Breach-Level-Index-Report.pdf
About the Survey
The research from SafeNet polled more than 350 senior IT decision-makers from around the world—about 29 per cent from the Asia Pacific region; 42 per cent from Europe, Middle East and Africa; and 29 per cent from North America. The report compares data with a corresponding report from 2013. The full report can be found here: http://www.safenet-inc.com/resources/Other/Data_Protection/2014_Authentication_Survey_-_Executive_Summary/
About SafeNet Data Protection Solutions
SafeNet data protection solutions provide multi-layer encryption with centralised key management and storage. SafeNet delivers the comprehensive encryption platforms that enable security professionals to safeguard sensitive data in data centres, virtualised data centres, and private and public clouds.
SafeNet enables customers to encrypt sensitive data at the storage, file, virtual instance, database, and application layer, while managing encryption security policies and encryption keys centrally. In addition, SafeNet supports format-preserving tokenisation for a wide variety of data types. Through this multi-layer approach, SafeNet enables organisations to:
- Separate administration of systems and applications from the data stored or processed within these infrastructure layers, ensuring privileged users can't see sensitive data.
- Take advantage of lower cost operational models while consistently enforcing security policies.
- Centralise encryption management across physical, virtual, and public cloud environments, and efficiently deliver detailed logs and compliance reporting for internal and external auditors.
- Employ key vaulting and secure cryptographic resources, both in data centre and multi-tenant environments, in order to retain full ownership and control of their encryption service.
With these capabilities, organisations can institute a defense-in-depth strategy that delivers high levels of security for sensitive data, regardless of where it resides—even if there has been a breach of other controls.
SafeNet Authentication Service
SafeNet Authentication Service is a cloud-based authentication solution that allows service providers and enterprises to rapidly introduce authentication-as-a-service to their customers. It also allows them to significantly reduce the cost and complexity associated with offering and implementing strong authentication, and to strengthen their security and compliance posture. This process is simplified through the flexibility and scalability of automated workflows, vendor-agnostic token integrations, and broad APIs. In addition, management capabilities and processes are fully automated and customisable—providing a seamless and enhanced user experience. With no infrastructure required, SafeNet Authentication Service enables a quick migration to a multi-tier and multi-tenant cloud environment, and protects everything from cloud-based and on-premises applications to networks, users, and devices.
About SafeNet, Inc.
Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organisations around the globe. SafeNet's data-centric approach focuses on the protection of high-value information throughout its lifecycle, from the data centre to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments. Learn more about SafeNet on Twitter, LinkedIn, Facebook, YouTube, and Google+.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal an...
Sep. 5, 2015 10:15 AM EDT Reads: 2,057
Containers are not new, but renewed commitments to performance, flexibility, and agility have propelled them to the top of the agenda today. By working without the need for virtualization and its overhead, containers are seen as the perfect way to deploy apps and services across multiple clouds. Containers can handle anything from file types to operating systems and services, including microservices. What are microservices? Unlike what the name implies, microservices are not necessarily small, but are focused on specific tasks. The ability for developers to deploy multiple containers – thous...
Sep. 5, 2015 10:00 AM EDT Reads: 236
Contrary to mainstream media attention, the multiple possibilities of how consumer IoT will transform our everyday lives aren’t the only angle of this headline-gaining trend. There’s a huge opportunity for “industrial IoT” and “Smart Cities” to impact the world in the same capacity – especially during critical situations. For example, a community water dam that needs to release water can leverage embedded critical communications logic to alert the appropriate individuals, on the right device, as soon as they are needed to take action.
Sep. 5, 2015 09:15 AM EDT Reads: 195
The Internet of Things is in the early stages of mainstream deployment but it promises to unlock value and rapidly transform how organizations manage, operationalize, and monetize their assets. IoT is a complex structure of hardware, sensors, applications, analytics and devices that need to be able to communicate geographically and across all functions. Once the data is collected from numerous endpoints, the challenge then becomes converting it into actionable insight.
Sep. 5, 2015 09:00 AM EDT Reads: 165
Manufacturing connected IoT versions of traditional products requires more than multiple deep technology skills. It also requires a shift in mindset, to realize that connected, sensor-enabled “things” act more like services than what we usually think of as products. In his session at @ThingsExpo, David Friedman, CEO and co-founder of Ayla Networks, will discuss how when sensors start generating detailed real-world data about products and how they’re being used, smart manufacturers can use the data to create additional revenue streams, such as improved warranties or premium features. Or slash...
Sep. 5, 2015 09:00 AM EDT Reads: 133
While many app developers are comfortable building apps for the smartphone, there is a whole new world out there. In his session at @ThingsExpo, Narayan Sainaney, Co-founder and CTO of Mojio, will discuss how the business case for connected car apps is growing and, with open platform companies having already done the heavy lifting, there really is no barrier to entry.
Sep. 5, 2015 08:45 AM EDT Reads: 248
As more intelligent IoT applications shift into gear, they’re merging into the ever-increasing traffic flow of the Internet. It won’t be long before we experience bottlenecks, as IoT traffic peaks during rush hours. Organizations that are unprepared will find themselves by the side of the road unable to cross back into the fast lane. As billions of new devices begin to communicate and exchange data – will your infrastructure be scalable enough to handle this new interconnected world?
Sep. 5, 2015 08:30 AM EDT Reads: 304
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes about through a Communications Platform as a Service which allows for messaging, screen sharing, video...
Sep. 5, 2015 08:00 AM EDT Reads: 776
Consumer IoT applications provide data about the user that just doesn’t exist in traditional PC or mobile web applications. This rich data, or “context,” enables the highly personalized consumer experiences that characterize many consumer IoT apps. This same data is also providing brands with unprecedented insight into how their connected products are being used, while, at the same time, powering highly targeted engagement and marketing opportunities. In his session at @ThingsExpo, Nathan Treloar, President and COO of Bebaio, will explore examples of brands transforming their businesses by t...
Sep. 5, 2015 08:00 AM EDT Reads: 327
The 3rd International WebRTC Summit, to be held Nov. 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 15th International Cloud Expo, 6th International Big Data Expo, 3rd International DevOps Summit and 2nd Internet of @ThingsExpo. WebRTC (Web-based Real-Time Communication) is an open source project supported by Google, Mozilla and Opera that aims to enable bro...
Sep. 5, 2015 07:15 AM EDT Reads: 1,656
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Sep. 5, 2015 07:00 AM EDT Reads: 525
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on demos and comprehensive walkthroughs.
Sep. 5, 2015 07:00 AM EDT Reads: 459
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal today!
Sep. 5, 2015 06:30 AM EDT Reads: 1,734
With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts, GM of Platform at FinancialForce.com, will discuss the value of business applications on wearable ...
Sep. 5, 2015 06:00 AM EDT Reads: 166
In his session at @ThingsExpo, Lee Williams, a producer of the first smartphones and tablets, will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ETwater. He will explain how M2M controllers work through wirelessly connected remote controls; and specifically delve into a retrofit option that reverse-engineers control codes of existing conventional controller systems so they don't have to be replaced and are instantly converted to become smart, connected devices.
Sep. 5, 2015 05:00 AM EDT Reads: 305
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Sep. 5, 2015 01:30 AM EDT Reads: 1,012
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be.
Sep. 5, 2015 01:00 AM EDT Reads: 274
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies leverage disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advanced analytics, and DevOps to advance innovation and increase agility. Specializing in designing, imple...
Sep. 5, 2015 01:00 AM EDT Reads: 428
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Sep. 4, 2015 06:45 PM EDT Reads: 464
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and analyzed? As an area of investment, how might a retail company move towards an innovation methodolo...
Sep. 4, 2015 04:15 PM EDT Reads: 542