|By RealWire News Distribution||
|May 21, 2014 07:43 AM EDT||
SafeNet Global Authentication Survey reveals more enterprises to adopt cloud-based authentication and mobile MFA to accommodate an increasingly mobile workforce
CAMBERLEY - May 21, 2014 - Rising security risks, and demand for seamless and secure access across any device, anytime, has triggered greater adoption of authentication solutions, according to new research from SafeNet, Inc., a global leader in data protection. The 2014 Global Annual Authentication Survey found that over one-third of organisations now use multi-factor authentication to provide seamless and secure access across a multitude of devices and locations - an increase from 2013.
The survey results illustrate that more businesses are adopting multi-factor authentication and distributing it across the wider workforce. The findings support a recent 451 Research report which reveals that access control and authentication are the top 'pain points' and priorities for IT departments. With 57 per cent of all data breaches in 2013 the result of malicious outsiders, multi-factor authentication reduces the risk of unauthorised users accessing sensitive information, while still ensuring staff can access corporate resources when and how they need them.
- Clear growth in multi-factor authentication (MFA) adoption:
- 37 per cent of organisations now use MFA for a majority of employees - up from 30 per cent last year
- By 2016, 56 per cent of organisations expect the majority of users to rely on multi-factor authentication.
- Cloud authentication gaining acceptance:
- 33 per cent of organisations indicated they preferred cloud-based authentication, up from 21 per cent last year - a 50 per cent increase
- 33 per cent are now open to the cloud for authentication implementations
- MFA for mobile devices:
- More than 53 per cent of respondents said users of mobile devices have restricted access to corporate resources.
- Those using MFA for mobile users, (22 per cent currently) expect usage to grow to 33 per cent by 2016 - an increase of 30 per cent
"It's clear that some IT departments are struggling to keep up with the rapid pace of change caused by new technologies. The danger is that companies are unable to offer staff the full system access they require to perform their job because they don't have the secure authentication in place to allow access. Then there's the fact that almost every other week we hear about a new enterprise being hacked and data potentially leaked. So there is a perpetual battle to keep up with fast-paced advances in technology, and attempts to protect the company and curb security risks," stated Jason Hart, Vice President of Cloud Solutions at SafeNet.
Cost and Budget Priority
The 451 Research report revealed that authentication and identity access management are a top priority for security projects. Yet, interestingly, in the SafeNet Authentication Survey, almost 40 per cent did not know how much their authentication solution costs per user per year, illustrating the lack of awareness over what is most cost-effective for the organisation. The perception that, by not spending extra on multi-factor authentication, the organisation is cost saving could be misleading to those in charge of IT budgeting. In fact, a multi-factor authentication solution aims to reduce authentication costs and improve ease of use.
Cloud vs. On-Premises-based Authentication
The growing demand from employees to connect to the corporate network with their own device has been met with a rise in cloud-based authentication from organisations. This year, 33 per cent of companies indicated that they preferred cloud-based authentication, up from 20 per cent last year.
"Ultimately, enterprises must accept that their staff will find ways to use mobile devices to access corporate data - with or without permission. Instead of preventing access, IT decision-makers need to deploy multi-factor authentication, which can offer the protection of corporate resources, while allowing staff access and maintaining productivity and performance," Hart added.
Authentication from Mobile Devices
When it comes to using strong authentication for mobile devices with access to corporate resources, the majority of responses were grouped at either end of the scale, showing polarised practices. Almost 40 per cent said less than 10 per cent of users are required to use strong authentication, while over 20 per cent suggest that 90-100 per cent of users currently require it. Interestingly, these figures are set to shift significantly, with 33 per cent expecting that 90-100 per cent of users will require strong authentication in the next two years, and only 15 per cent suggest less than 10 per cent, emphasising the growing importance of mobile authentication.
The drive towards mobile authentication is also fuelling a move from hardware- to software-based authentication tokens. The survey revealed that the use of software-based authentication rose from 27 per cent in 2013 to 40 per cent in 2014, with the expectation that this will rise again to 50 per cent in 2016. Conversely, the use of hardware-based authentication dropped from 60 per cent in 2013 to 41 per cent in 2014.
"IT companies are certainly responding to the rise in mobility with increased software-based authentication; however, there appears to be a 'disconnect' between the desire to embrace mobility, and the struggle to keep up with it and protect resources and data from external threats. Furthermore, as adoption of cloud computing grows, better security becomes crucial. Indeed, the cloud offers various benefits for authentication and applications, but without the security to support them, it only increases the threat." Hart concluded.
 The enterprise information security organisation in 2014, 451 Research; https://451research.com/report-short?entityId=80256
 Breach Level Index Annual Recap, SafeNet: http://breachlevelindex.com/pdf/Breach-Level-Index-Report.pdf
About the Survey
The research from SafeNet polled more than 350 senior IT decision-makers from around the world—about 29 per cent from the Asia Pacific region; 42 per cent from Europe, Middle East and Africa; and 29 per cent from North America. The report compares data with a corresponding report from 2013. The full report can be found here: http://www.safenet-inc.com/resources/Other/Data_Protection/2014_Authentication_Survey_-_Executive_Summary/
About SafeNet Data Protection Solutions
SafeNet data protection solutions provide multi-layer encryption with centralised key management and storage. SafeNet delivers the comprehensive encryption platforms that enable security professionals to safeguard sensitive data in data centres, virtualised data centres, and private and public clouds.
SafeNet enables customers to encrypt sensitive data at the storage, file, virtual instance, database, and application layer, while managing encryption security policies and encryption keys centrally. In addition, SafeNet supports format-preserving tokenisation for a wide variety of data types. Through this multi-layer approach, SafeNet enables organisations to:
- Separate administration of systems and applications from the data stored or processed within these infrastructure layers, ensuring privileged users can't see sensitive data.
- Take advantage of lower cost operational models while consistently enforcing security policies.
- Centralise encryption management across physical, virtual, and public cloud environments, and efficiently deliver detailed logs and compliance reporting for internal and external auditors.
- Employ key vaulting and secure cryptographic resources, both in data centre and multi-tenant environments, in order to retain full ownership and control of their encryption service.
With these capabilities, organisations can institute a defense-in-depth strategy that delivers high levels of security for sensitive data, regardless of where it resides—even if there has been a breach of other controls.
SafeNet Authentication Service
SafeNet Authentication Service is a cloud-based authentication solution that allows service providers and enterprises to rapidly introduce authentication-as-a-service to their customers. It also allows them to significantly reduce the cost and complexity associated with offering and implementing strong authentication, and to strengthen their security and compliance posture. This process is simplified through the flexibility and scalability of automated workflows, vendor-agnostic token integrations, and broad APIs. In addition, management capabilities and processes are fully automated and customisable—providing a seamless and enhanced user experience. With no infrastructure required, SafeNet Authentication Service enables a quick migration to a multi-tier and multi-tenant cloud environment, and protects everything from cloud-based and on-premises applications to networks, users, and devices.
About SafeNet, Inc.
Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organisations around the globe. SafeNet's data-centric approach focuses on the protection of high-value information throughout its lifecycle, from the data centre to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments. Learn more about SafeNet on Twitter, LinkedIn, Facebook, YouTube, and Google+.
- Mainstream Business Applications and In-Memory Databases
- In 2014 Big Data Investments Will Account for Nearly $30 Billion - Eventually Accounting for $76 Billion by 2020 End
- IoT: I Don't Care How Big It Is!
- Power Panel: IoT Poineers Discuss Internet Of Things
- Business Process Management (BPM), Cloud, Mobile, and Patterns Market Shares, Strategies, and Forecasts, Worldwide, 2014-2020
- @ThingsExpo Debuts Internet Of Things Newsletter
- Global e-Learning Industry
- Worldwide Indoor Location Market Growing at 46.0% CAGR to 2019 Says a New Research Report Available at RnRMarketResearch.com
- Express Logic Eases IoT Development
- (BPM) Business Process Management Market to Reach $10 Billion by 2020
- Digital Transformation's Impact on Enterprise Mobility and App Design Strategies
- Understanding Application Performance on the Network | Part 6
- Mainstream Business Applications and In-Memory Databases
- Findly Enhances Recruiting Efficiency With New Single Sign-on Portal
- Flexera Software Increases Commitment to Europe with Germany-based Datacenter to Host FlexNet Manager Suite Cloud for European Customers
- Apple iOS and the Enterprise - Latest Developments
- IoT: I Don't Care How Big It Is!
- CORRECTING and REPLACING Android and the Open Automotive Alliance Shift into the Next Gear
- More on OnLive: New Cloud Solution Delivers Secure Cross-Platform Deployment for Graphics Intensive Applications
- How to Monitor Swift/iOS8 Applications for Crashes and Performance Issues
- Power Panel: IoT Poineers Discuss Internet Of Things
- AppDynamics Closes $120 Million in Growth Financing to Accelerate Platform and Sales Expansion
- Rackspace Positioned in the Leaders Quadrant of Gartner's Magic Quadrant for Cloud-Enabled Managed Hosting in Both North America and Europe
- Building a Drag-and-Drop Shopping Cart with AJAX
- What Is AJAX?
- Google Maps! AJAX-Style Web Development Using ASP.NET
- Where Are RIA Technologies Headed in 2008?
- Dolphin Announces Open API With Over 50 Add-ons Including Dropbox and Wikipedia
- How and Why AJAX, Not Java, Became the Favored Technology for Rich Internet Applications
- Flashback to January 2006: Exclusive SYS-CON.TV Interviews on "OpenAjax Alliance" Announcement
- "Real-World AJAX" One-Day Seminar Arrives in Silicon Valley
- AJAXWorld Conference & Expo to Take Place October 2-4, 2006, at the Santa Clara Convention Center, California
- AJAX Sponsor Webcasts Are Now Available at AJAXWorld Website
- AJAXWorld University Announces AJAX Developer Bootcamp
- i-Technology 2008 Predictions: Where's RIAs, AJAX, SOA and Virtualization Headed in 2008?
With the explosion of the cloud, more businesses are transitioning to a recurring revenue model to generate reliable sales, grow profits, and open new markets. This opportunity requires businesses to get to market quickly with the pricing and packaging options customers want. In addition, you will want to take advantage of the ensuing tidal wave of data to more effectively upsell, cross-sell and manage your customers. All of this is possible, but only with the right approach. At 15th Cloud Expo, Brendan O'Brien, Co-founder at Aria Systems and the inventor of cloud billing panelists, will lead a panel discussion on what it takes to launch and manage a successful recurring revenue business. The panelists will offer their insights about what each department will need to consider, from financial management to line of business and IT. The panelists will also offer examples from their success in recurring revenue with companies such as Audi, Constant Contact, Experian, Pitney-Bowes, Teleko...
Sep. 12, 2014 11:45 PM EDT Reads: 1,380
Planning scalable environments isn't terribly difficult, but it does require a change of perspective. In his session at 15th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, will broaden your views to think on an Internet scale by dissecting a video publishing application built with The SoftLayer Platform, Message Queuing, Object Storage, and Drupal. By examining a scalable modular application build that can handle unpredictable traffic, attendees will able to grow your development arsenal and pick up a few strategies to apply to your own projects.
Sep. 12, 2014 11:30 PM EDT Reads: 1,691
Come learn about what you need to consider when moving your data to the cloud. In her session at 15th Cloud Expo, Skyla Loomis, a Program Director of Cloudant Development at Cloudant, will discuss the security, performance, and operational implications of keeping your data on premise, moving it to the cloud, or taking a hybrid approach. She will use real customer examples to illustrate the tradeoffs, key decision points, and how to be successful with a cloud or hybrid cloud solution.
Sep. 12, 2014 09:00 PM EDT Reads: 1,931
The cloud provides an easy onramp to building and deploying Big Data solutions. Transitioning from initial deployment to large-scale, highly performant operations may not be as easy. In his session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, will discuss the benefits, weaknesses, and performance characteristics of public and bare metal cloud deployments that can help you make the right decisions.
Sep. 11, 2014 10:30 PM EDT Reads: 2,128
Over the last few years the healthcare ecosystem has revolved around innovations in Electronic Health Record (HER) based systems. This evolution has helped us achieve much desired interoperability. Now the focus is shifting to other equally important aspects – scalability and performance. While applying cloud computing environments to the EHR systems, a special consideration needs to be given to the cloud enablement of Veterans Health Information Systems and Technology Architecture (VistA), i.e., the largest single medical system in the United States.
Sep. 10, 2014 06:30 PM EDT Reads: 3,178
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization’s assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? In his session at 15th Cloud Expo, Derek Tumulak, Vice President of Product Management at Vormetric, will discuss how to address data security in cloud and Big Data environments so that your organization isn’t next week’s data breach headline.
Sep. 10, 2014 03:00 PM EDT Reads: 2,635
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
Sep. 6, 2014 06:45 PM EDT Reads: 4,745
Is your organization struggling to deal with skyrocketing volumes of digital assets? The amount of data is growing exponentially and organizations are having a hard time managing this growth. In his session at 15th Cloud Expo, Amar Kapadia, Senior Director of Open Cloud Strategy at Seagate, will walk through the essential considerations when developing a cloud storage strategy. In this discussion, you will understand the challenges IT is facing, why companies need to move to cloud, and how the right cloud model can help your business economically overcome the data struggle.
Sep. 6, 2014 02:00 PM EDT Reads: 1,628
If cloud computing benefits are so clear, why have so few enterprises migrated their mission-critical apps? The answer is often inertia and FUD. No one ever got fired for not moving to the cloud – not yet. In his session at 15th Cloud Expo, Michael Hoch, SVP, Cloud Advisory Service at Virtustream, will discuss the six key steps to justify and execute your MCA cloud migration.
Sep. 6, 2014 11:00 AM EDT Reads: 1,738
The 16th International Cloud Expo announces that its Call for Papers is now open. 16th International Cloud Expo, to be held June 9–11, 2015, at the Javits Center in New York City brings together Cloud Computing, APM, APIs, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal today!
Sep. 5, 2014 02:15 PM EDT Reads: 2,895
Most of today’s hardware manufacturers are building servers with at least one SATA Port, but not every systems engineer utilizes them. This is considered a loss in the game of maximizing potential storage space in a fixed unit. The SATADOM Series was created by Innodisk as a high-performance, small form factor boot drive with low power consumption to be plugged into the unused SATA port on your server board as an alternative to hard drive or USB boot-up. Built for 1U systems, this powerful device is smaller than a one dollar coin, and frees up otherwise dead space on your motherboard. To meet the requirements of tomorrow’s cloud hardware, Innodisk invested internal R&D resources to develop our SATA III series of products. The SATA III SATADOM boasts 500/180MBs R/W Speeds respectively, or double R/W Speed of SATA II products.
Sep. 4, 2014 07:15 PM EDT Reads: 8,696
In today's application economy, enterprise organizations realize that it's their applications that are the heart and soul of their business. If their application users have a bad experience, their revenue and reputation are at stake. In his session at 15th Cloud Expo, Anand Akela, Senior Director of Product Marketing for Application Performance Management at CA Technologies, will discuss how a user-centric Application Performance Management solution can help inspire your users with every application transaction.
Sep. 4, 2014 05:00 PM EDT Reads: 1,719
SYS-CON Events announced today that Gridstore™, the leader in software-defined storage (SDS) purpose-built for Windows Servers and Hyper-V, will exhibit at SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Gridstore™ is the leader in software-defined storage purpose built for virtualization that is designed to accelerate applications in virtualized environments. Using its patented Server-Side Virtual Controller™ Technology (SVCT) to eliminate the I/O blender effect and accelerate applications Gridstore delivers vmOptimized™ Storage that self-optimizes to each application or VM across both virtual and physical environments. Leveraging a grid architecture, Gridstore delivers the first end-to-end storage QoS to ensure the most important App or VM performance is never compromised. The storage grid, that uses Gridstore’s performance optimized nodes or capacity optimized nodes, starts with as few a...
Sep. 4, 2014 01:45 PM EDT Reads: 2,290
SYS-CON Events announced today that Cloudian, Inc., the leading provider of hybrid cloud storage solutions, has been named “Bronze Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Cloudian is a Foster City, Calif.-based software company specializing in cloud storage. Cloudian HyperStore® is an S3-compatible cloud object storage platform that enables service providers and enterprises to build reliable, affordable and scalable hybrid cloud storage solutions. Cloudian actively partners with leading cloud computing environments including Amazon Web Services, Citrix Cloud Platform, Apache CloudStack, OpenStack and the vast ecosystem of S3 compatible tools and applications. Cloudian's customers include Vodafone, Nextel, NTT, Nifty, and LunaCloud. The company has additional offices in China and Japan.
Sep. 3, 2014 07:00 PM EDT Reads: 3,007
SYS-CON Events announced today that TechXtend (formerly Programmer’s Paradise), a leading value-added provider of server and storage virtualization, and r-evolution will exhibit at SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. TechXtend (formerly Programmer’s Paradise) is a leading value-added provider of software, systems and solutions for corporations, government organizations, and academic institutions across the United States and Canada. TechXtend is the Exclusive Reseller in the United States for r-evolution
Sep. 3, 2014 01:00 PM EDT Reads: 2,499