SafeNet: Multiple identity authentication protects data access security

Source: Internet
Author: User
Keywords Cloud computing data security

SafeNet, the world's leading data protection provider, says that with the increased risk of data protection, and the seamless docking of users across devices and the need for secure access to data, identity authentication solutions have been widely used. In the 2014 Global Identification survey, more than One-third of organizations are using multiple identity authentication (multi-factor authentication) to allow data access to be performed seamlessly and securely across multiple devices and locations.

Survey results show that more and more enterprises are using multiple authentication and apply to the wider working mode. The results are similar to the recent 451 Research report 1, revealing that data access control and identity authentication are the challenges and priorities of the current enterprise IT departments. Foreign malicious intruders have caused 57% of data leaks in the past 2013 years 2, multiple authentication reduces the risk of unauthorized users accessing sensitive data, while allowing authorized employees to flexibly access enterprise data when needed without time and space constraints.

Report important Data releases

· Multi-identity authentication has been widely used and the increase is obvious:

o 37% of organizations are providing multiple identities for most employees, up more than 30% per cent over previous years

O It is expected that by 2016, 56% of the institutions will expect most users to rely on multiple authentication

· Increased cloud identity recognition:

o 33% of agencies say they tend to choose cloud mode of identity authentication

o 33% institutions are open to cloud to deploy identity authentication

· Multiple identity authentication on mobile devices:

o more than 53% per cent of respondents say mobile device users are often limited in accessing corporate data

o Among users of mobile devices that use multiple identities, 22% per cent of those surveyed expect this certification to increase to 33% in 2016, with a growth rate of 30%

"Some IT departments are trying to adapt to the changes brought about by the new technology," said Rana Gupta, vice president of SafeNet Asia Pacific. Among them, the more prominent problem is that some companies do not have a secure identity authentication to restrict data access, so the company failed to provide staff with a complete access system to meet the staff more flexible work needs. In addition, we hear almost every other week about new businesses being hacked or even leaking data. As a result, companies are in a rapidly changing it ecosystem to protect the company's data security, and may reduce security risks will be a protracted war. ”

How to balance cost and benefit?

451Research reports show that identity authentication and identity access management are priority issues in security projects. However, in the SafeNet Identification survey, nearly 40% of respondents did not know the cost per user of their identity certification solution each year. This suggests that the Organization is not aware of what is the most cost-effective solution and mistakenly believes that the cost savings can be achieved by not spending additional costs on multiple identities, which in fact misleads the people responsible for it budgets. In fact, multiple authentication is designed to reduce authentication costs and improve the portability of data enterprise access.

Cloud based identity authentication vs. in-place deployment

The need for employees to connect to the corporate network with mobile devices is closely linked to the need for the organization to adopt cloud-oriented authentication. This year, 33% of companies say they tend to use cloud-based authentication, up more than 20% in previous years.

Gupta added: "It is a general trend for companies to deploy more flexible data access to their employees on the premise of ensuring data security." Rather than preventing employees from accessing data through mobile devices, it decision makers need to deploy multiple identities to improve productivity by making it easier for employees to access data while protecting the enterprise's data resources. ”

Identity authentication on mobile devices

Most of the responses are also extreme when companies deploy robust identity authentication on mobile devices. According to the SafeNet survey, on the one hand, 40% of the agencies surveyed said that fewer than 10% of users were required to use strong authentication; On the other hand, more than 20% of the respondents said that 90% to 100% of the users needed strong authentication. The figures are expected to change significantly in the future: 33% of institutions expect most users to require strong authentication over the next two years, and only 15% think less than 10% of users need it.

The identity authentication of mobile devices is becoming increasingly important. In this context, it is especially necessary to change the identity authentication method from the original hardware-based model to the software based model. The survey showed that the use of software-oriented authentication rose from 27% in 2013 to 40% in 2014, predicting that the ratio would reach 50% by 2016. In contrast, the use of hardware-oriented authentication decreased from 60% in 2013 to 41% in 2014.

Gupta concludes: "It companies are working to help users achieve more mobile data access through universal software-based identity authentication." However, in the mobile, adapt to the trend of it change, to protect the security of enterprise data resources, there seems to be not fully unified. On the other hand, with the growing popularity of cloud computing applications, user requirements for security measures will also increase. Cloud technology does offer many benefits for identity authentication and applications, but without the support of security technology, cloud technology can only increase security risk. ”

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.