|By RealWire News Distribution||
|May 21, 2014 07:43 AM EDT||
SafeNet Global Authentication Survey reveals more enterprises to adopt cloud-based authentication and mobile MFA to accommodate an increasingly mobile workforce
CAMBERLEY - May 21, 2014 - Rising security risks, and demand for seamless and secure access across any device, anytime, has triggered greater adoption of authentication solutions, according to new research from SafeNet, Inc., a global leader in data protection. The 2014 Global Annual Authentication Survey found that over one-third of organisations now use multi-factor authentication to provide seamless and secure access across a multitude of devices and locations - an increase from 2013.
The survey results illustrate that more businesses are adopting multi-factor authentication and distributing it across the wider workforce. The findings support a recent 451 Research report which reveals that access control and authentication are the top 'pain points' and priorities for IT departments. With 57 per cent of all data breaches in 2013 the result of malicious outsiders, multi-factor authentication reduces the risk of unauthorised users accessing sensitive information, while still ensuring staff can access corporate resources when and how they need them.
- Clear growth in multi-factor authentication (MFA) adoption:
- 37 per cent of organisations now use MFA for a majority of employees - up from 30 per cent last year
- By 2016, 56 per cent of organisations expect the majority of users to rely on multi-factor authentication.
- Cloud authentication gaining acceptance:
- 33 per cent of organisations indicated they preferred cloud-based authentication, up from 21 per cent last year - a 50 per cent increase
- 33 per cent are now open to the cloud for authentication implementations
- MFA for mobile devices:
- More than 53 per cent of respondents said users of mobile devices have restricted access to corporate resources.
- Those using MFA for mobile users, (22 per cent currently) expect usage to grow to 33 per cent by 2016 - an increase of 30 per cent
"It's clear that some IT departments are struggling to keep up with the rapid pace of change caused by new technologies. The danger is that companies are unable to offer staff the full system access they require to perform their job because they don't have the secure authentication in place to allow access. Then there's the fact that almost every other week we hear about a new enterprise being hacked and data potentially leaked. So there is a perpetual battle to keep up with fast-paced advances in technology, and attempts to protect the company and curb security risks," stated Jason Hart, Vice President of Cloud Solutions at SafeNet.
Cost and Budget Priority
The 451 Research report revealed that authentication and identity access management are a top priority for security projects. Yet, interestingly, in the SafeNet Authentication Survey, almost 40 per cent did not know how much their authentication solution costs per user per year, illustrating the lack of awareness over what is most cost-effective for the organisation. The perception that, by not spending extra on multi-factor authentication, the organisation is cost saving could be misleading to those in charge of IT budgeting. In fact, a multi-factor authentication solution aims to reduce authentication costs and improve ease of use.
Cloud vs. On-Premises-based Authentication
The growing demand from employees to connect to the corporate network with their own device has been met with a rise in cloud-based authentication from organisations. This year, 33 per cent of companies indicated that they preferred cloud-based authentication, up from 20 per cent last year.
"Ultimately, enterprises must accept that their staff will find ways to use mobile devices to access corporate data - with or without permission. Instead of preventing access, IT decision-makers need to deploy multi-factor authentication, which can offer the protection of corporate resources, while allowing staff access and maintaining productivity and performance," Hart added.
Authentication from Mobile Devices
When it comes to using strong authentication for mobile devices with access to corporate resources, the majority of responses were grouped at either end of the scale, showing polarised practices. Almost 40 per cent said less than 10 per cent of users are required to use strong authentication, while over 20 per cent suggest that 90-100 per cent of users currently require it. Interestingly, these figures are set to shift significantly, with 33 per cent expecting that 90-100 per cent of users will require strong authentication in the next two years, and only 15 per cent suggest less than 10 per cent, emphasising the growing importance of mobile authentication.
The drive towards mobile authentication is also fuelling a move from hardware- to software-based authentication tokens. The survey revealed that the use of software-based authentication rose from 27 per cent in 2013 to 40 per cent in 2014, with the expectation that this will rise again to 50 per cent in 2016. Conversely, the use of hardware-based authentication dropped from 60 per cent in 2013 to 41 per cent in 2014.
"IT companies are certainly responding to the rise in mobility with increased software-based authentication; however, there appears to be a 'disconnect' between the desire to embrace mobility, and the struggle to keep up with it and protect resources and data from external threats. Furthermore, as adoption of cloud computing grows, better security becomes crucial. Indeed, the cloud offers various benefits for authentication and applications, but without the security to support them, it only increases the threat." Hart concluded.
 The enterprise information security organisation in 2014, 451 Research; https://451research.com/report-short?entityId=80256
 Breach Level Index Annual Recap, SafeNet: http://breachlevelindex.com/pdf/Breach-Level-Index-Report.pdf
About the Survey
The research from SafeNet polled more than 350 senior IT decision-makers from around the world—about 29 per cent from the Asia Pacific region; 42 per cent from Europe, Middle East and Africa; and 29 per cent from North America. The report compares data with a corresponding report from 2013. The full report can be found here: http://www.safenet-inc.com/resources/Other/Data_Protection/2014_Authentication_Survey_-_Executive_Summary/
About SafeNet Data Protection Solutions
SafeNet data protection solutions provide multi-layer encryption with centralised key management and storage. SafeNet delivers the comprehensive encryption platforms that enable security professionals to safeguard sensitive data in data centres, virtualised data centres, and private and public clouds.
SafeNet enables customers to encrypt sensitive data at the storage, file, virtual instance, database, and application layer, while managing encryption security policies and encryption keys centrally. In addition, SafeNet supports format-preserving tokenisation for a wide variety of data types. Through this multi-layer approach, SafeNet enables organisations to:
- Separate administration of systems and applications from the data stored or processed within these infrastructure layers, ensuring privileged users can't see sensitive data.
- Take advantage of lower cost operational models while consistently enforcing security policies.
- Centralise encryption management across physical, virtual, and public cloud environments, and efficiently deliver detailed logs and compliance reporting for internal and external auditors.
- Employ key vaulting and secure cryptographic resources, both in data centre and multi-tenant environments, in order to retain full ownership and control of their encryption service.
With these capabilities, organisations can institute a defense-in-depth strategy that delivers high levels of security for sensitive data, regardless of where it resides—even if there has been a breach of other controls.
SafeNet Authentication Service
SafeNet Authentication Service is a cloud-based authentication solution that allows service providers and enterprises to rapidly introduce authentication-as-a-service to their customers. It also allows them to significantly reduce the cost and complexity associated with offering and implementing strong authentication, and to strengthen their security and compliance posture. This process is simplified through the flexibility and scalability of automated workflows, vendor-agnostic token integrations, and broad APIs. In addition, management capabilities and processes are fully automated and customisable—providing a seamless and enhanced user experience. With no infrastructure required, SafeNet Authentication Service enables a quick migration to a multi-tier and multi-tenant cloud environment, and protects everything from cloud-based and on-premises applications to networks, users, and devices.
About SafeNet, Inc.
Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organisations around the globe. SafeNet's data-centric approach focuses on the protection of high-value information throughout its lifecycle, from the data centre to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments. Learn more about SafeNet on Twitter, LinkedIn, Facebook, YouTube, and Google+.
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
Sep. 27, 2016 08:15 AM EDT Reads: 2,608
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...
Sep. 27, 2016 08:00 AM EDT Reads: 2,773
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Sep. 27, 2016 08:00 AM EDT Reads: 1,980
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
Sep. 27, 2016 08:00 AM EDT Reads: 2,466
"We have several customers now running private clouds. They're not as large as they should be but it's getting there. The adoption challenge has been pretty simple. Look at the world today of virtualization vs cloud," stated Nara Rajagopalan, CEO of Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Sep. 27, 2016 08:00 AM EDT Reads: 2,166
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 27, 2016 08:00 AM EDT Reads: 3,642
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
Sep. 27, 2016 07:45 AM EDT Reads: 3,232
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Sep. 27, 2016 07:45 AM EDT Reads: 2,479
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
Sep. 27, 2016 07:30 AM EDT Reads: 2,955
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Sep. 27, 2016 07:15 AM EDT Reads: 2,786
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Sep. 27, 2016 07:15 AM EDT Reads: 1,114
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
Sep. 27, 2016 07:00 AM EDT Reads: 2,178
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
Sep. 27, 2016 06:45 AM EDT Reads: 3,322
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Sep. 27, 2016 06:30 AM EDT Reads: 1,840
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Sep. 27, 2016 06:15 AM EDT Reads: 2,613
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Sep. 27, 2016 06:00 AM EDT Reads: 2,564
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Sep. 27, 2016 05:30 AM EDT Reads: 1,153
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Sep. 27, 2016 05:15 AM EDT Reads: 1,445
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
Sep. 27, 2016 04:45 AM EDT Reads: 1,153
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Sep. 27, 2016 04:30 AM EDT Reads: 2,009