Identity Security Trends in the Mobile Era
Transcription
Identity Security Trends in the Mobile Era
pingidentity.com IDENTITY SECURITY TRENDS IN THE MOBILE ERA CONTENTS TRENDS IN IDENTITY SECURITY 3 INSIGHT #1 4 PRODUCTIVITY AND USER EXPERIENCE TRUMP EVERYTHING ELSE INSIGHT #2 5 SECURITY IS BOTH A LEADING DRIVER AND A CHALLENGE FOR MOBILE INITIATIVES INSIGHT #3 7 EXECS SEE MOBILE DEVICES AS KEY TO THE POST-PASSWORD ERA INSIGHT #4 8 ENTERPRISES ARE SEEKING A SINGLE IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEM FOR WEB, API AND MOBILE ACCESS LET’S REVIEW 9 INSIGHTS POINT TO FEDERATED IDENTITY AND ACCESS MANAGEMENT APPENDIX PARTICIPANT PROFILE Sources Gartner, Predicts 2014: Identity and Access Management, 26 November 2013, Analyst(s): Ray Wagner, Earl Perkins, Gregg Kreizman, 1 Felix Gaehtgens, Ant Allan 10 years. Mobile devices, which are effectively powerful personal computers, are everywhere and possess enormous business potential. Gartner® states that, “By year-end 2020, 80% of user access will be shaped by new mobile and non-PC architectures that service all identity types regardless of origin1.” Additionally, IDC estimates that 55 percent of all smartphones used in business will be employee-owned in 2015. These and other statistics have most enterprises struggling with a host of issues surrounding the use and security of mobile devices for work. To better understand the mindset and priorities of those who make security decisions for mobile devices in the workplace, Ping Identity conducted a mobility survey in partnership with Gatepoint Research. The results shed enterprise mobile initiatives. TRENDS IN light on four main insights into the top challenges and motivations for IDENTITY SECURITY The business landscape has changed dramatically within just the past five 3 INSIGHT #1 PRODUCTIVITY AND USER EXPERIENCE TRUMP EVERYTHING ELSE WHAT ARE YOUR DEVELOPMENT GOALS FOR MOBILE APPLICATIONS? Improved user experience regarding access/login 89% Improved user productivity 88% Secure, auditable and compliant access to data 83% Faster time to value 82% Reduce current and future costs of securing mobile apps 79% Faster time to market 72% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% or your customers, users expect a great experience and an app that “We want to continue to provide our customers with exceptional customer experiences and that means engaging with them where they are—conveniently over their smartphones, tablets or the Internet.” adds value quickly. Deliver less, and your brand will suffer. Eric Barnes, Application Development Manager, Wawa Inc. Eighty-eight percent say the top development goal for mobile Learn more about how WaWa is Staying a Step Ahead of On-the- applications is improved user productivity. Leading enterprises have Go Customers. Eighty-nine percent of respondents cite improved user experience as the top development goal for mobile applications. They know that user experience is king. Whether rolling out mobile apps to your workforce discovered that a mobile workforce is a more productive and satisfied one. 4 INSIGHT #2 SECURITY IS BOTH A LEADING DRIVER AND A CHALLENGE FOR MOBILE INITIATIVES WHAT ARE YOUR DEVELOPMENT GOALS FOR MOBILE APPLICATIONS? Improved user experience regarding access/login 89% Improved user productivity 88% Secure, auditable and compliant access to data 83% Faster time to value 82% Reduce current and future costs of securing mobile apps 79% Faster time to market 72% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% When respondents were asked about their goals for mobile applications, “Secure, auditable, and compliant access to data” was cited 83 percent of the time. This was the third most common goal stated, just behind productivity and user experience. 5 SECURITY IS BOTH A LEADING DRIVER AND A CHALLENGE FOR MOBILE INITIATIVES (cont.) WHAT ISSUES CONSTRAIN YOUR ABILITY TO PROVIDE GREATER MOBILE ACCESS? Securing issues over devices caching passwords locally 71% Multiple policy stores for web and mobile access controls 66% Inability to scale mobile app development without higher security risks 66% Inability to scale mobile app development cost effectively 63% Inability to report on who accessed what data 59% Inability to control access 52% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% When participants were asked about the issues that constrain their exposing the enterprise to risk when a device is stolen or lost. They rollout of mobile applications, 71 percent said that, “Security issues want to scale their mobile application development to meet the needs over devices caching passwords locally” was a significant concern. Next of the app economy, but they need to ensure that security scales with on the list of issues was, “Inability to scale mobile app development their mobile app development needs. without higher security risks.” Read about how Land O’ Lakes rolled out simple secure access As the participants know, mobile devices pose a unique set of threats to mobile apps. to enterprise security. Because the nature of mobile devices, bidirectional access to data occurs beyond the protection of the firewall. And in most cases, passwords are stored directly on the device— 6 INSIGHT #3 EXECS SEE MOBILE DEVICES AS KEY TO THE POST-PASSWORD ERA WHAT ARE YOUR GOALS FOR YOUR MOBILE INITIATIVES? Securing issues over devices caching passwords locally 49% Multiple policy stores for web and mobile access controls 47% Inability to scale mobile app development without higher security risks 39% Inability to scale mobile app development cost effectively 29% Inability to report on who accessed what data 9% Inability to control access 6% 0% 10% 20% 30% 40% 50% 60% Almost 40 percent of the participants see mobile platforms as a way to era—and for good reasons. Among other problems with passwords, provide multi-factor or strong authentication as a means to improving the main cause of security breaches and hacks is stolen credentials. security. In addition, they’re seeking simpler, more innovative and lower-cost ways to handle multi-factor authentication through the use Learn more about transforming smartphones into mobile of mobile device applications. authentication devices. The goal of using mobile devices for strong authentication is proof that enterprise reliance on passwords as a primary authentication method is starting to break down. They’re moving toward the post-password 7 INSIGHT #4 ENTERPRISES ARE SEEKING A SINGLE IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEM FOR WEB, API AND MOBILE ACCESS WHAT ARE YOUR GOALS FOR YOUR MOBILE INITIATIVES? Single system for web, API and mobile 55% Secure single sign-on for native mobile apps and web apps 51% Flexible deployment options 49% Standards-based mobile access management and security (OAuth 2.0, OpenID Connect) 46% 0% 10% 20% 30% 40% 50% 60% Support for web, API and mobile access was the most common goal cited for future mobile access. This all-of-the-above approach clearly provides the most flexibility to meet current and future employee and customer needs for productivity and user experience. But what about security? Respondents answered that in the following question, where they indicated that a single system that supported web, API and mobile authentication and authorization was the most desirable attribute of an IAM solution. Read about a modern architecture for identity management. 8 LET’S REVIEW INSIGHTS POINT TO FEDERATED IDENTITY AND ACCESS MANAGEMENT Productivity and user experience trump everything else. Execs see mobile devices as a possible solution to insecure passwords. 12 34 Security is both a leading driver and challenge for mobile initiatives. Enterprises are seeking a single identity and access management (IAM) system for web, API and mobile access. These insights underscore the value of a federated identity and access management (IAM) system, which is the core of Ping Identity’s solution. Such a solution simplifies and secures the ugly, complex, heterogeneous world of enterprise IT. The Ping Identity platform addresses all four insights and more: • SSO–boosts productivity and improves user experience • Mobile SSO and API security–provides a scalable framework to make mobile devices and apps secure and productive • Mobile MFA–transforms a mobile device into a second-factor authentication method • Based on standards–engineered to secure web, mobile, and API security with open standards Go to pingidentity.com to learn more about how you can address the business insights and trends of this decade and the next. 9 APPENDIX PARTICIPANT PROFILE Participants of the survey represent a wide range of industries, CxO 14% Manager 23% decision-making roles and budgets. One hundred perfect of responders VP 15% participated voluntarily; none were engaged using telemarketing. Director 47% High Tech Management 11% Healthcare 28% Business Services 19% Job Level: Survey participants represent senior management and executives in decision-making roles. Retail Trade 22% Financial Services 20% Yes 18% Industry Sector: Survey participants represent firms from a wide No 50% range of industries. Forty-five percent are in the Fortune 1000. Not sure 32% <$250 million 6% $250 million - $500 million 19% Use of WAM for Mobile App Initiatives: Fifty percent of >$1.5 billion 45% participants admit that they don’t currently leverage a web access management (WAM) infrastructure to support mobile app $500 million - $1.5 billion 23% development. Revenue: Participants represent firms with a well stratified range of revenues. About Ping Identity | The Identity Security Company Ping Identity is the leader in Identity Defined Security for the borderless enterprise, allowing employees, customers and partners access to the applications they need. Protecting over one billion identities worldwide, the company ensures the right people access the right things, securely and seamlessly. More than half of the Fortune 100, including Boeing, Cisco, Disney, GE, Kraft Foods, TIAA-CREF and Walgreens, trust Ping Identity to solve modern enterprise security challenges created by their use of cloud, mobile, APIs and IoT. Visit pingidentity.com. Copyright ©2015 Ping Identity Corporation. All rights reserved. Ping Identity, PingFederate, PingOne, PingAccess, PingID, their respective product marks, the Ping Identity trademark logo, and PingCon are trademarks, or servicemarks of Ping Identity Corporation. All other product and service names mentioned are the trademarks of their respective companies. 0715.01 10