SlideShare a Scribd company logo
1 of 16
Enhancing Authentication to Secure the
    Open Enterprise
       Findings: Forrester Consulting Commissioned Study



Enhancing Authentication to Secure the Open Enterprise     1
SAFE INITIATIVE

          1        About The Study


          2        Myths and Misconceptions

          3        Essential Steps and Key Recommendations


          4        How Symantec can help




Enhancing Authentication to Secure the Open Enterprise       2
Basics of the Study….
• Who did Forrester talk to?
  – 306 enterprises in North America
  – Companies ranged from 1,000+ employees to 20,000+ employees
  – Industries ranged from Manufacturing to Media and Entertainment (20%
    Mfg; 18% Fin Svc; 17% Business Svc; 12% Retail; 9% Healthcare)
  – Job role ranged from IT manager to CIO/CTO (39% IT Mgr; 24% Director of
    IT security; 26% CIO/CTO/CISO)
• When did the study take place?
  – Between September and November 2010 with final results published in
    December, 2010
• Why did we do it?
  – To understand the changes in corporate IT environments over the last few
    years and how this relates to their authentication strategy
Key Finding #1: IT Environments are Expanding Beyond
Traditional Corporate Boundaries Introducing Risk

• Widespread use of Web 2.0 and
  cloud based applications


• Lots of remote workers accessing
  the corporate network


• Employee owned personal
  computers & devices on the
  corporate network


• Number of security breaches have
  gone up


Enhancing Authentication to Secure the Open Enterprise   4
Key Finding #1: IT Environments are Expanding Beyond
Traditional Corporate Boundaries Introducing Risk
• 76% of enterprises using SaaS based applications; 54% of
  enterprises using two or more SaaS applications
• External collaboration and communication outside corporate
  systems very popular
  –   Web conferencing: 77%
  –   Personal email: 70%
  –   IM: 44%
  –   Social Networking: 40%
• 25% Have full access to corporate LAN with personal computer
• Over 50% have remote access to corporate LAN from personal
  computer
• 58% have had data breach in last year
Key Finding #2: Password Issues are The Top Access Problem

• Policies on password composition getting more and more
  complex


• Password expiration and lock out to mitigate risk have become
  a major burden


• Password related issues generating in-ordinate number of help
  desk calls costing companies dearly


• Use of strong authentication technologies is lagging
Key Finding #2: Password Issues are The Top Access Problem
• 66% of companies have at least 6 different password policies


• 87% of companies require users to remember at least 2
  passwords and 27% require users to remember 6 or more
  passwords


• 81% of companies report complex password policies to be
  single biggest user complaint
Key Finding #3: Outdated perception of cost and value inhibit
adoption of Strong Authentication

• Many companies have not implemented any form of strong
  authentication


• Majority of companies who have implemented strong
  authentication have only done so for a subset of users accessing
  their network


• Incorrect perception of cost of ownership of strong
  authentication solutions are top reasons for not implementing
  technology
Key Finding #3: Outdated perception of cost and value inhibit
adoption of Strong Authentication
• Only 30% of companies require strong auth as primary
  authentication system for access to corporate network


• 67% of companies have no strong auth requirement for
  partners


• 57% of companies sighted cost of ownership as main
  impediment to adopting strong auth


• Growing use of mobile token or token-less authentication
  among adopters of strong auth
1        About The Study


          2        Myths and Misconceptions


          3        Essential Steps and Key Recommendations

          4        How Symantec can help




Enhancing Authentication to Secure the Open Enterprise       10
Common Myths and Misconceptions
                       MYTHS                                             RESPONSES
                                                            Inherent improvements to the technology, new
            Implementation of strong                      models for its delivery, and broader applicability of
                                                           the technology from a risk perspective, given the
           authentication is expensive.                        opening up of the enterprise to SaaS have
                                                          dramatically reduced TCO of strong authentication.




                                                           Adequately protecting a single gateway, such as a
      Protecting a single gateway channel                VPN, while employing antiquated protection to other
                  is sufficient.                         avenues essentially means you are locking doors and
                                                                         opening windows.




                                                         Data is stored everywhere, access is everything. The
          Password-based protection is                    perimeters must come down to support business
                   enough.                                 needs. Antiquated password policies no longer
                                                                               suffice.




Enhancing Authentication to Secure the Open Enterprise                                                            11
1        The Study


          2        Myths and Misconceptions

          3        Essential Steps and Key Recommendations


          4        How Symantec can help (Atri)




Enhancing Authentication to Secure the Open Enterprise       12
Recommendations
• Take action on strong authentication to counter growing risk
  in the threat landscape.
• Expand strong authentication from selective use to
  standardized practice
• Reassess use of the technology given that industry innovation
  has conquered major cost and usability concerns
• Align strong authentication with open enterprise initiatives




Enhancing Authentication to Secure the Open Enterprise            13
1        The Study


          2        Myths and Misconceptions


          3        Essential Steps and Key Recommendations

          4        How Symantec can help




Enhancing Authentication to Secure the Open Enterprise       14
User Authentication Product Family
          Public Key Infrastructure              VeriSign Identity Protection         Fraud Detection Service
                                                                                           Rules Eng.   Behavior Eng.




                                                                                                 RISK SCORE

          PKI service issues certificates        Shared cloud-based two-factor
           for strong authentication,            authentication solution offering     Risk-Based authentication and
          encryption and digital signing           multiple credential choices       software-based fraud detection




       Government                                                       Enterprise
                                            eCommerce                                         Financial Services




Enhancing Authentication to Secure the Open Enterprise                                                                  15
For more information on this study, or to find more information,
                           please go to

                         www.verisign.com/safe



Enhancing Authentication to Secure the Open Enterprise              16

More Related Content

What's hot

Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Skybox Security
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
crussell79
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
Savvius, Inc
 

What's hot (20)

Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware Event
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
The Jisc vulnerability assessment management service – part 2: how to avoid t...
The Jisc vulnerability assessment management service – part 2: how to avoid t...The Jisc vulnerability assessment management service – part 2: how to avoid t...
The Jisc vulnerability assessment management service – part 2: how to avoid t...
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
Mobile Security Research Projects Help
Mobile Security  Research Projects HelpMobile Security  Research Projects Help
Mobile Security Research Projects Help
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of Cybersecurity
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Three trends in cybersecurity
Three trends in cybersecurityThree trends in cybersecurity
Three trends in cybersecurity
 

Similar to Enhancing Authentication to Secure the Open Enterprise

Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
SafeNet
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
Bob Guimarin
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
sucesuminas
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
Ayham Kochaji
 
Symantec-CWS_Brochure
Symantec-CWS_BrochureSymantec-CWS_Brochure
Symantec-CWS_Brochure
Justyna Majek
 
Why network based security
Why network based securityWhy network based security
Why network based security
Alan Rudd
 

Similar to Enhancing Authentication to Secure the Open Enterprise (20)

Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling Business
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
POV - Enterprise Security Canvas
POV - Enterprise Security CanvasPOV - Enterprise Security Canvas
POV - Enterprise Security Canvas
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
16231
1623116231
16231
 
BEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICESBEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICES
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
CCSK.pptx
CCSK.pptxCCSK.pptx
CCSK.pptx
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Symantec-CWS_Brochure
Symantec-CWS_BrochureSymantec-CWS_Brochure
Symantec-CWS_Brochure
 
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and AuthorizedSecuring the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
 
Why network based security
Why network based securityWhy network based security
Why network based security
 

More from Symantec

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 

Enhancing Authentication to Secure the Open Enterprise

  • 1. Enhancing Authentication to Secure the Open Enterprise Findings: Forrester Consulting Commissioned Study Enhancing Authentication to Secure the Open Enterprise 1
  • 2. SAFE INITIATIVE 1 About The Study 2 Myths and Misconceptions 3 Essential Steps and Key Recommendations 4 How Symantec can help Enhancing Authentication to Secure the Open Enterprise 2
  • 3. Basics of the Study…. • Who did Forrester talk to? – 306 enterprises in North America – Companies ranged from 1,000+ employees to 20,000+ employees – Industries ranged from Manufacturing to Media and Entertainment (20% Mfg; 18% Fin Svc; 17% Business Svc; 12% Retail; 9% Healthcare) – Job role ranged from IT manager to CIO/CTO (39% IT Mgr; 24% Director of IT security; 26% CIO/CTO/CISO) • When did the study take place? – Between September and November 2010 with final results published in December, 2010 • Why did we do it? – To understand the changes in corporate IT environments over the last few years and how this relates to their authentication strategy
  • 4. Key Finding #1: IT Environments are Expanding Beyond Traditional Corporate Boundaries Introducing Risk • Widespread use of Web 2.0 and cloud based applications • Lots of remote workers accessing the corporate network • Employee owned personal computers & devices on the corporate network • Number of security breaches have gone up Enhancing Authentication to Secure the Open Enterprise 4
  • 5. Key Finding #1: IT Environments are Expanding Beyond Traditional Corporate Boundaries Introducing Risk • 76% of enterprises using SaaS based applications; 54% of enterprises using two or more SaaS applications • External collaboration and communication outside corporate systems very popular – Web conferencing: 77% – Personal email: 70% – IM: 44% – Social Networking: 40% • 25% Have full access to corporate LAN with personal computer • Over 50% have remote access to corporate LAN from personal computer • 58% have had data breach in last year
  • 6. Key Finding #2: Password Issues are The Top Access Problem • Policies on password composition getting more and more complex • Password expiration and lock out to mitigate risk have become a major burden • Password related issues generating in-ordinate number of help desk calls costing companies dearly • Use of strong authentication technologies is lagging
  • 7. Key Finding #2: Password Issues are The Top Access Problem • 66% of companies have at least 6 different password policies • 87% of companies require users to remember at least 2 passwords and 27% require users to remember 6 or more passwords • 81% of companies report complex password policies to be single biggest user complaint
  • 8. Key Finding #3: Outdated perception of cost and value inhibit adoption of Strong Authentication • Many companies have not implemented any form of strong authentication • Majority of companies who have implemented strong authentication have only done so for a subset of users accessing their network • Incorrect perception of cost of ownership of strong authentication solutions are top reasons for not implementing technology
  • 9. Key Finding #3: Outdated perception of cost and value inhibit adoption of Strong Authentication • Only 30% of companies require strong auth as primary authentication system for access to corporate network • 67% of companies have no strong auth requirement for partners • 57% of companies sighted cost of ownership as main impediment to adopting strong auth • Growing use of mobile token or token-less authentication among adopters of strong auth
  • 10. 1 About The Study 2 Myths and Misconceptions 3 Essential Steps and Key Recommendations 4 How Symantec can help Enhancing Authentication to Secure the Open Enterprise 10
  • 11. Common Myths and Misconceptions MYTHS RESPONSES Inherent improvements to the technology, new Implementation of strong models for its delivery, and broader applicability of the technology from a risk perspective, given the authentication is expensive. opening up of the enterprise to SaaS have dramatically reduced TCO of strong authentication. Adequately protecting a single gateway, such as a Protecting a single gateway channel VPN, while employing antiquated protection to other is sufficient. avenues essentially means you are locking doors and opening windows. Data is stored everywhere, access is everything. The Password-based protection is perimeters must come down to support business enough. needs. Antiquated password policies no longer suffice. Enhancing Authentication to Secure the Open Enterprise 11
  • 12. 1 The Study 2 Myths and Misconceptions 3 Essential Steps and Key Recommendations 4 How Symantec can help (Atri) Enhancing Authentication to Secure the Open Enterprise 12
  • 13. Recommendations • Take action on strong authentication to counter growing risk in the threat landscape. • Expand strong authentication from selective use to standardized practice • Reassess use of the technology given that industry innovation has conquered major cost and usability concerns • Align strong authentication with open enterprise initiatives Enhancing Authentication to Secure the Open Enterprise 13
  • 14. 1 The Study 2 Myths and Misconceptions 3 Essential Steps and Key Recommendations 4 How Symantec can help Enhancing Authentication to Secure the Open Enterprise 14
  • 15. User Authentication Product Family Public Key Infrastructure VeriSign Identity Protection Fraud Detection Service Rules Eng. Behavior Eng. RISK SCORE PKI service issues certificates Shared cloud-based two-factor for strong authentication, authentication solution offering Risk-Based authentication and encryption and digital signing multiple credential choices software-based fraud detection Government Enterprise eCommerce Financial Services Enhancing Authentication to Secure the Open Enterprise 15
  • 16. For more information on this study, or to find more information, please go to www.verisign.com/safe Enhancing Authentication to Secure the Open Enterprise 16