简体中文 | 繁體中文 | English

Gemalto 2018

Businesses Under Pressure - Employees Want Same Simple Access to Cloud Applications as Consumers, Finds Gemalto

70% believe that authentication methods applied in the consumer world can be applied to secure access to enterprise resources
(94%) respondents believe that cloud access management is integral to adopting cloud applications

2018-03-14 09:44
  • zh_cn
  • zh_hant
  • en

AMSTERDAM--()--New research from Gemalto, the world leader in digital security, found that the proliferation of cloud applications and use of a disparate range of devices within businesses has led to nearly two-thirds (64%) of IT leaders admitting that their security teams are considering implementing consumer-grade access to cloud services for employees. Surveying more than 1,000 IT decision makers globally, Gemalto’s 2018 Identity and Access Management Index revealed that the majority (54%) believe that the authentication methods they implement in their businesses are not as good compared to those found on popular sites including Amazon and Facebook.With a growing number of cloud apps in use, more employees working remotely and pressure mounting to make authentication stronger while ensuring ease of use, IT decision makers are keen to ‘consumerize’ the login process. In fact, 70% of IT professionals believe that authentication methods applied in the consumer world can be applied to secure access to enterprise resources.

Despite this, 92% of IT leaders express concern about employees reusing personal credentials for work. This comes as 61% admit that they are still not implementing two-factor authentication to allow access to their network, potentially leaving themselves vulnerable to cyber criminals.

At the same time, there seems to be increasing recognition that new approaches to cloud access can contribute to alleviating these issues. 62% of respondents believe that cloud access management tools can help simplify the login process for users, while 72% stated that a strong consideration for implementing a cloud access solution is the desire to reduce the threat of large scale breaches. The fact that 61% of respondents also stated that inefficient cloud identity management would be a key factor in adopting a cloud access management solution, shows that scalability and management overheads are also of high concern to IT professionals.

“These findings clearly show that IT managers are struggling to balance the need for a simple and easy login experience with security,” said Francois Lasnier, SVP Identity and Access Management at Gemalto. “While there is a need to make things easier for employees, there is a fine line to be walked. IT and business line managers would do best to figure out the risks and sensitivities associated with the various applications used in their organizations and then use access management policies to manage risk and apply the appropriate authentication method. In this way, they can ensure a convenient login experience for their users, while still maintaining access security.”

With the growth in remote working, the cloud and secure access to applications have become important for organizations. As a result, almost all (94%) respondents believe that cloud access management is integral to adopting cloud applications. In fact, nine in 10 also feel that ineffective cloud access management can lead to issues for their company, such as security (52%), IT staff’s time being used less efficiently (39%) and increased operational overheads and IT costs (38%). Despite this focus on protecting cloud applications, just three of the 27 used on average1 by organizations are protected with two-factor authentication.

“The rapid increase of cloud apps has brought organizations lots of benefits, but also caused a high degree of fragmentation in their ability to manage access security across numerous cloud and on-premises applications,” continued Lasnier. “Without effective access management tools in place, this is liable to lead to higher risk of breach, a lack of visibility into access events, regulatory oversight - and hamper organizations’ ability to scale in the cloud.”

Additional Resources:

  • For more information including the full report, infographic and regional data, visit the IAMI website.
  • Gemalto will host a webinar on March 8th on Identity and Access Management trends: The Consumerization of Enterprise Security. Click here to register.
  • Find out more about Gemalto’s access management solutions.

About Gemalto

Gemalto (Euronext NL0000400653 GTO) is the global leader in digital security, with 2017 annual revenues of €3 billion and customers in over 180 countries. We bring trust to an increasingly connected world.

From secure software to biometrics and encryption, our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between.

Gemalto’s solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things.

Our 15,000 employees operate out of 114 offices, 40 personalization and data centers, and 35 research and software development centers located in 47 countries.

For more information visit www.gemalto.com, or follow @gemalto on Twitter.

_______________

http://www2.gemalto.com/cloud-security-research/

Contacts

Gemalto
Tauri Cox, +1 512 257 3916
North America
tauri.cox@gemalto.com
or
Sophie Dombres, +33 4 42 55 36 57 38
Europe Middle East & Africa
sophie.dombres@gemalto.com
or
Jaslin Huang, +65 6317 3005
Asia Pacific
jaslin.huang@gemalto.com
or
Enriqueta Sedano, +52 5521221422
Latin America
enriqueta.sedano@gemalto.com

 
分享到: