This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Community Blog

Subscribe to the official SecurID Community blog for information about new product features, industry insights, best practices and more.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Blogs
  • :
  • Answering the #1 Question in Identity Management

Answering the #1 Question in Identity Management

MelanieSommer
Employee MelanieSommer
Employee
0 0 861
  • Subscribe to RSS Feed
  • Mark as New
  • Mark as Read
  • Bookmark
  • Subscribe
  • Email to a Friend
  • Printer Friendly Page
  • Report Inappropriate Content
‎2017-03-23 02:13 PM

Takeaways from a Recent Identity Survey by IDG

It’s the infamous joke we’ve all used at one point or another – “Knock, knock. Who’s there?” When it comes to identity management, knowing the answer to this question is mission critical. Whether your employees, contractors, customers and partners are accessing your data, applications and systems in the cloud, web, or on-premises, you need to be 100% confident that your users are who they say they are.

 

Why? Because weak, default, and stolen user credentials have been used in 63% of confirmed data breaches.

Not surprisingly, in a recent IDG survey, sponsored by RSA, conducted with IT professionals, 68% of respondents cite a high-level of concern regarding the risk of a cybersecurity attack resulting from compromised identities.

 

The emergence of identity as a major threat vector places a premium on delivering convenient and secure access across your mobile endpoints. Today, those endpoints are expanding, along with an increase in cloud applications. Islands of identity that have been created as a result are a concern for 47% of respondents. With the loss of central IT control and visibility over user credentials and authentication for disparate mobile, social, and cloud applications, these users – and their identities – are vulnerable, potentially exposing your organization to unauthorized users.

 

Human endpoints are growing too, and 51% of respondents say that expansion of the user base is a top security concern. New users include external partners, vendors, suppliers, audit teams, consultants, and customers. Only 24% of respondents felt confident that they could enforce access control policies for these new users. In addition, third-party users whose companies have weak data safeguards and security controls offer a “backdoor” for attackers into your organization.

 

The prevalence of mobile devices today has fueled a culture of users who are accustomed to convenient access. Touch ID for the iPhone and biometrics for Android have set expectations for consumer-level convenience in the workplace, particularly with BYOD. A large majority (85%) of respondents, though, say that user convenience has been compromised to some extent in their organizations in order to enforce access control policies. The problem for 26% of respondents is that inconvenient authentication controls often are ignored or subverted by their users, which ultimately puts the organization at risk.

 

It is not surprising, given these concerns, that 51% of respondents look for strong authentication that passes audits and meets regulatory compliance (PCI, PII data, HIPAA, etc.) as the top most important identity management feature when evaluating identity management solutions. Other essential features include the ability to address authentication anywhere, any time, and from any user or device (49%), context-aware and step-up authentication (49%), as well as the ability to integrate with applications up and down the stack – on-premises, legacy, web, and SaaS (47%).

 

If you’re having difficulty authenticating the answer to “who’s there?” when users are knocking at your entry points, you are not alone. Nearly half of the respondents are evaluating or plan to invest in a new identity management solution in the near future.

 

Rethink your approach to multi-factor authentication. Gain unwavering confidence that your users are who they say they are with RSA SecurID® Access, a more intelligent, frictionless, convenient, and secure way to provide users access to your valuable on-premises or cloud applications and data. RSA SecurID Access employs multi-factor authentication through a variety of advanced mobile authenticator options including push authentication, biometrics, as well as hardware and software tokens and leverages contextually-relevant data and risk-based analytics to help IT automate key access decisions while managing the islands of identity, and ultimately, enabling the business to accelerate while mitigating identity risk.

Tags (9)
  • Tags:
  • identity assurance
  • infographic
  • multifactor authentication
  • RSA Identity
  • RSA SecurID
  • RSA SecurID Access
  • rsa_securid_access
  • SecurID
  • survey
0 Likes
Share

You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.

  • Comment
Latest Articles
  • In the era of Hybrid Work – SecurID macOS Authenticator is here!
  • SecurID Cloud Authentication Service Transitions Identity Source Synchronization from Scheduled Sync...
  • SecurID JUNE Release Accelerates RSA Cloud First Strategy
  • Introducing the New SecurID™ App 3.0 for iOS® and Android™
  • Stronger, Simpler and Better – 3 Reasons on choosing SecurID® for Passwordless Windows log-in
  • Defense-in-Depth: RSA SecurID® Access in November 2020
  • Protect Stormshield VPN with RSA MFA
  • Optimize your Dynamic Workforce with RSA SecurID Access
  • Securing access to corporate endpoints is made easy with RSA MFA Agent 2.0.1 for Microsoft Windows
  • New RSA SecurID Access & Authentication Manager Training – Your commute hours have never been so pro...
Labels
  • Announcements 3
  • Features 1
  • Resources 1
  • Tutorials 27
  • Use Cases 3
  • Videos 93
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.