Can Two-Factor Authentication Fix Mobile Security?

 
 
By Karen A. Frenkel  |  Posted 12-03-2015 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Can Two-Factor Authentication Fix Mobile Security?
    Next

    Can Two-Factor Authentication Fix Mobile Security?

    In an effort to combat mobile security concerns, IT decision-makers are turning to two-factor authentication as a service.
  • Previous
    Majority Restrict Mobile Access
    Next

    Majority Restrict Mobile Access

    92% of IT departments worldwide still restrict users from accessing sensitive corporate data and resources from mobile devices.
  • Previous
    Obstacles to Increased User Mobility
    Next

    Obstacles to Increased User Mobility

    Despite 98% of organizations having users who require mobile or remote access, 95% of IT departments face obstacles to increased user mobility because of security concerns.
  • Previous
    Security Concerns
    Next

    Security Concerns

    94% of respondents are concerned that their organization will be breached or hacked as a result of theft or compromise.
  • Previous
    Mobile Endpoints Add to Concern
    Next

    Mobile Endpoints Add to Concern

    The rise of mobile, which on average is two mobile endpoints per user and managing three sets of credentials per user, is exacerbating security concerns.
  • Previous
    Impact of Lost or Forgotten Usernames and Passwords
    Next

    Impact of Lost or Forgotten Usernames and Passwords

    20% of IT support tickets result from lost or forgotten usernames and passwords.
  • Previous
    Overcoming the Mobile Security Challenge
    Next

    Overcoming the Mobile Security Challenge

    To overcome mobile security challenges, 86% of IT departments plan to implement two-factor authentication for access to cloud applications. 38% of users do so now and this is expected to rise to 51% in two years.
  • Previous
    Two-Factor Authentication Now
    Next

    Two-Factor Authentication Now

    57% of respondents already use two-factor authentication to secure external users' access.
  • Previous
    Top Three Apps Protected By Two-Factor Authentication
    Next

    Top Three Apps Protected By Two-Factor Authentication

    92% of respondents have at least one application protected by two factor authentication. The top three apps: cloud applications, web portals and VPNs.
  • Previous
    Rise of Authentication as a Service?
    Next

    Rise of Authentication as a Service?

    91% of respondents seek to solve the credential problem with two-factor authentication that is a cloud-based authentication as a service. 90% regard cloud delivery as a key consideration when choosing to buy such solutions.
 

A staggering 95% of IT decision-makers admit obstacles to increased user mobility, according to a new survey. The study, "2015 Global Authentication and Identity Access Management Index," polled 900 IT decision-makers and was conducted by Vance Bourne for Dutch digital security firm Gemalto. "The pressure is on for IT departments to accommodate demands for greater mobility as employees crave new and flexible approaches to working," said François Lasnier, senior vice president for Identity Protection at Gemalto. "Organizations that are not open to this change are very likely to be inhibiting business productivity." Furthermore, the growing use of cloud applications and mobile devices within organizations, combined with rising threats and the need to reduce costs, indicate an immediate need for authentication and access management solutions, he said. Users are likely to do whatever it takes to get the job done with or without permission, he said, so when corporate resources are scattered across different sites, the need for strong authentication and as-a-service delivery will be vital to making this happen securely.

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register