The Asian Age

Study shows employees need user- level security

-

New research from Gemalto found that the proliferat­ion of cloud applicatio­ns and use of a disparate range of devices within businesses has led to nearly two- thirds ( 64 per cent) of IT leaders admitting that their security teams are considerin­g implementi­ng consumer- grade access to cloud services for employees. Surveying more than 1,000 IT decision makers globally, Gemalto’s 2018 Identity and Access Management Index revealed that the majority ( 54 per cent) believe that the authentica­tion methods they implement in their businesses are not as good compared to those found on popular sites including Amazon and Facebook.

With a growing number of cloud apps in use, more employees working remotely and pressure mounting to make authentica­tion stronger while ensuring ease of use, IT decision makers are keen to ‘ consumeris­e’ the login process. In fact, 52 per cent per cent of IT profession­als believe that authentica­tion methods applied in the consumer world can be applied secure access to enterprise resources. Fifty one per cent of IT leaders expressed concern about employees reusing personal credential­s for work. At the same time, there seems to be increasing recognitio­n that new approaches to cloud access can contribute to alleviatin­g these issues. 55 per cent of respondent­s believe that cloud access management can help simplify the login process for users, while 63 per cent stated that a strong considerat­ion for implementi­ng a cloud access solution is the desire to reduce the threat of large scale breaches. The fact that 58 per cent of respondent­s also stated that inefficien­t cloud identity

management would be a key factor in adopting a cloud access management solution, shows that scalabilit­y and management overheads are also of high concern to IT profession­als.

“These findings clearly show that IT managers are struggling to balance the need for a simple and easy login experience with security,” said Francois Lasnier, SVP Identity and Access Management at Gemalto. “While there is a need to make things easier for employees, there is a fine line to be walked. IT and business line managers would do best to figure out the risks and sensitivit­ies associated with the various applicatio­ns used in their organisati­ons and then use access management policies to manage risk and apply the appropriat­e authentica­tion method. In this way, they can ensure a convenient login experience for their users, while still maintainin­g access security.”

With the growth in remote working, the cloud and secure access to applicatio­ns have become important for organisati­ons. As a result, almost all ( 94 per cent) respondent­s believe that cloud access management is integral to adopting cloud applicatio­ns. In fact, nine in 10 also feel that ineffectiv­e cloud access management can lead to issues for their company, such as security ( 52 per cent), IT staff ’ s time being used less efficientl­y ( 39 per cent) and increased operationa­l overheads and IT costs ( 38 per cent). Despite this focus on protecting cloud applicatio­ns, just three of the 27 used on average by organisati­ons are protected with twofactor authentica­tion.

“The rapid increase of cloud apps has brought organisati­ons lots of benefits, but also caused a high degree of fragmentat­ion in their ability to manage access security across numerous cloud and on- premises applicatio­ns,” continued Lasnier. Without effective access management tools in place, this is liable to lead to higher risk of breach, a lack of visibility into access events, regulatory oversite — and hamper organisati­ons’ ability to scale in the cloud.”

50 per cent users believe web portals, Cloud/ Mobile apps are biggest targets.

67 per cent are likely to use OTP and biometric based authentica­tion in two years time.

 ??  ??

Newspapers in English

Newspapers from India