Security is top reason why IT adopts single sign-on
Posted on 21 February 2013.
Security is the number one reason why IT professionals implement single sign-on (SSO) and identity and access management (IAM) technology, according to new research from Symplified.

The average organization now manages thousands of employee, customer and partner identities through dozens of on-premises and cloud-based apps, but the IAM and SSO solutions they are using have left them vulnerable to data breaches and hindered visibility into application usage.

Surveying 200 U.S. IT professionals at organizations of all sizes, Symplified found:
  • 70% of respondents said security was the primary reason for adopting IAM and SSO, ahead of user convenience and supporting mobile access
  • The average organization now manages up to 50 on-premises applications -- two times the number of cloud-based applications currently managed
  • Only 37% of organizations with existing IAM and SSO solutions have visibility into details like what files users are downloading while logged into applications locally or remotely
  • 59% have experienced unauthorized data access by a user whose account remained active when it should have been de-provisioned
  • 71% replicate user data in the cloud with their IAM and SSO solutions, including passwords and birth dates, which introduces the unnecessary risk of placing sensitive user data outside the organization’s control.
“Businesses are increasingly running on a mix of on-premises and cloud-based applications, and it’s great to see they recognize the need to secure the customer, partner, contractor and employee data flowing through them,” said Shayne Higdon, president and CEO of Symplified. “However, among the IT professionals with some form of IAM and SSO in place, our findings showed widespread issues with compliance and auditing, account de-provisioning, and replication of sensitive data in the cloud – all inherent risks associated with using services that are designed for user convenience and don’t take a holistic approach to Identity-as-a-Service (IDaaS).”

The primary reasons why IT adopts IAM and SSO:
  • 70% with a solution in place reported security was their primary motivation for implementation
  • 51% cited IT resource reduction, while 49% cited convenience/user experience and 43% cited automating user provisioning
  • Additional reasons: Supporting mobile access (43%), compliance (42%), usage auditing (41%) and strong authentication (31%)
  • 74% of respondents without IAM and SSO solutions in place plan to implement one within the next 24 months, citing security (50%), IT resource reduction (39%), user convenience (32%), and strong authentication (32%) as top reasons.
Bridging identities and applications on-premises and in the cloud:
  • 31% of IT professionals surveyed manage up to 50 on-premises applications; 28% manage as many as 500
  • 26% manage up to 25 cloud-based applications; 20% manage as many as 50
  • 98% are managing employee user identities via IAM and SSO solutions, managing on average up to 1,000 employee identities
  • 93% are managing customer user identities, with the average respondent managing up to 2,500 customer identities
  • 96% are managing partner user identities, with the average respondent managing up to 1,000 partner identities.
Employee, customer and partner data is being put at risk as it is replicated in the cloud:
  • IT professionals surveyed who manage employee identities reported their IAM and SSO solutions replicate the following data in the cloud: Username (88%), password (86%), full name (55%), and birth date (35%)
  • Those managing partner identities reported their IAM and SSO solutions replicate the following data: Username (80%), password (77%), full name (77%), and birth date (25%)
  • Those managing customer identities reported their IAM and SSO solutions replicate the following data: Username (78%), password (70%), full name (53%), and birth date (23%).





Spotlight

The psychology of phishing

Posted on 23 July 2014.  |  Cybercriminals no longer send out thousands of emails at random hoping to get a handful of hits, today they create highly targeted phishing emails which are tailored to suit their recipients.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //