Token Security or Just Token Security? A Vanson Bourne report for Entrust

Size: px
Start display at page:

Download "Token Security or Just Token Security? A Vanson Bourne report for Entrust"

Transcription

1 Token Security or Just Token Security? A Vanson Bourne report for Entrust

2 Foreword In 2011, Entrust Inc., an identity-based security company, partnered with respected technology research firm Vanson Bourne to gain a stronger understanding on what security solutions enterprises are using to defend themselves from online breaches, fraud, digital identity theft and other Internet-related attacks in the UK. While traditional attack vectors have long posed problems for enterprises, the ubiquity of mobile devices is greatly increasing vulnerabilities. To defend against an evolving threat landscape, Entrust strongly recommends the use of a layered security strategy for all environments, verticals or industries. To help, Entrust s layered approach enables organisations to manage multiple authenticators and provides enterprises the ability to rapidly switch between them in the event of a breach. By providing strong authentication, physical and logical access, mobile device management and other credentialing services, Entrust offers organisations a single platform to defend against even the most sophisticated of attacks. Dave Rockvam General Manager Entrust Certificate Services & Chief Marketing Officer UK-based enterprises are evolving to stronger security solutions, but the survey found that there s still much room for improvement. Far too many organisations continue to rely on simple username-and-password defences that are simply too easy to circumvent. Further, those organisations that do deploy stronger authentication don t have the versatility to switch authenticators, in real time, in the unfortunate case of a breach. 2 Token Security or Just Token Security?

3 Contents Background 4 Research scope 4 Objectives 4 Introduction 5 A layered approach 6 Prevalence of token-based authentication 6 Security breaches 6 Alternative methods of authentication 7 How long does it take organisations to switch security methods? 8 Awareness of security 9 Why do organisations not have an alternative method of authentication? 9 How well informed is the CEO when it comes to security risks? 9 The importance and security of mobility 10 Security of mobile devices 11 Conclusions 12 3 Token Security or Just Token Security?

4 Background Research scope In autumn 2011, Entrust appointed specialist technology market research house Vanson Bourne to interview 100 senior IT decision-makers across the UK. All respondents came from enterprise-sized organisations; 50% of the respondents from organisations with 1,000-3,000 employees and 50% from organisations with more than 3,000 employees, split evenly across the following sectors: Financial services Manufacturing Retail, distribution and transport Government Other commercial While the 100 responses gives a robust analysis of how the enterprise community is behaving, the sector split delivers a narrower, more snapshot view of each vertical. Objectives There were three main objectives for this research: - First, to determine what UK enterprises use to defend themselves against breaches - Second, to expose just how many large organisations within the UK have experienced some form of security breach as a result of identity fraud - Third, to establish the importance of mobility, and whether or not UK enterprises are capable of securing mobile devices. 4 Token Security or Just Token Security?

5 Introduction Four out of five UK enterprises use a token-based authentication system that is, users must provide some form of token in order to identify themselves; examples of such are hardware tokens, key fobs or USB tokens. Token-based authentication systems are best utilised when the user has to team the token which is something they must have on their person with something that they know, like a password, PIN or a piece of memorable information. Tokens or smartcards can contain many different types of information. Some tokens will hold a digital signature of the authorised owner, some will produce a unique code which is scrambled by an algorithm each time a user wishes to enter a building or log on to a machine, and some more advanced systems will hold biometric data such as retinal scans or fingerprints. tokens. From this it can be concluded that just having one line of defence is not enough 26% of those with a token-based approach still experienced security breaches, therefore a multilayered approach is favourable. However, the 26% who have token-based security and have experienced a breach includes 32% of those who have an alternative method of authentication implying that there may need to be more than just one back-up plan. Furthermore, there is a general consensus that mobility is important both to organisations themselves, and to their customers. However, when it comes to securing mobile devices, there is a chink in the armour as fewer than three in five (55%) use token-based authentication systems for mobile devices that enter the corporate network. This essentially means that with these most advanced systems, in order for a user to enter a location, or access data remotely, they will need to provide three things unique to them, to prove their identity something they know, something they have and something they are. This approach does appear to go the distance when protecting organisations from breaches but only four out of five large UK organisations actually use a token-based authentication system meaning that 20% are more open to attack. Further, of those who do have a system in place, only two in three (68%) have an alternative method should their token-based approach be compromised again leaving a significant number open to attack. But what is truly alarming is that despite more than half of IT decision-makers (56%) believing their CEO and board are aware of IT security risks, 26% of organisations, who employ a token-based security approach, have suffered a security breach as a result of identity fraud, linked to lost or stolen 5 Token Security or Just Token Security?

6 A layered approach Prevalence of token-based authentication Figure 1a: Larger organisations are more likely to use token-based authentication systems Only 80% of UK enterprise organisations currently use a token-based authentication system, which means that one in five don t see this security method as necessary. 68% 92% When looking at the data across the sectors, it can be seen that there are slight variations in attitudes; just 70% of respondents in government said that they utilise token-based authentication systems, compared to the overall average of 80%, and 90% in the financial services sector and in the other commercial sector. Figure 1: Just four in five UK enterprises have a token-based authentication system Those with a token-based authentication system Those without a token-based authentication system 20% 80% However, there is a more noticeable difference here when we look at this data by the size of the organisations (figure 1a right) Organisations with employees Larger enterprises are much more likely to use a token-based authentication system than their smaller counterparts. So, are larger organisations better protected as a result? Security breaches Organisations with more than 3000 employees More than a quarter (26%) of organisations that employ a token-based authentication system have experienced a security breach that was a result of identity fraud linked to a lost or stolen authentication device. This number drops to just 22% in the largest organisations and reaches 32% among the smaller enterprises. This could be linked to the fact that larger organisations appear to be the vanguards here, and may be using a more sophisticated method of authentication than smaller organisations. Therefore, without added levels of security, identity fraud and the consequent organisation breach is easier and therefore more likely among smaller organisations. 6 Token Security or Just Token Security?

7 But do organisations have a back-up plan if their token-based security approach is successfully attacked? Alternative methods of authentication Just two thirds of organisations that utilise a tokenbased approach (68%) have an alternative method of authentication that they could use, should their primary approach be compromised. (83%) and again, government is the least likely (50%). So, what are the most common alternative methods being used? Figure 3: A strong username or password is the most common alternative authentication method Strong username/ password 86% Figure 2: A third of organisations do not have an alternative method of authentication to turn to in the event of a breach Knowledge-based questions Soft-tokens 18% 53% Those with an alternative method 33% Grid card 16% Those without an alternative method 68% SMS 12% When we look at the difference in organisation size, we see a slightly dislocated story; while figure 1a showed that larger organisations are more likely to have a token-based authentication system in the first place, smaller organisations that have tokenbased authentication systems are actually more likely to have an alternative method of authentication they could turn to in the event of a breach (85% vs. 54%). And we can see a similar story with sectors; we have already unearthed that those in the financial services sector were among those most likely to be using token-based authentication in the first place. And now a picture is starting to form, as they are also the most likely to have an alternative method On average, organisations that have alternative methods of authentication have two such methods they turn to. The most common, used by six out of seven organisations (86%) that have an alternative method of authentication in case their token-based system is breached, is a strong username or password. The second most popular alternative method, utilised by just over half (53%) are knowledgebased questions. But how long does it take to switch from one method of authentication to another? 7 Token Security or Just Token Security?

8 How long does it take organisations to switch security methods? Of all organisations both those with and without token-based authentication systems just 64% can change their method of authentication from one means to another, within a day. However, when we look at just those with a tokenbased authentication system who have an alternative method (54/100 organisations) this percentage leaps to 80% of this group that can change their method of authentication within a day. This suggests that those with token-based authentication may be slightly more advanced when it comes to the ability to switch authentication methods. But what is concerning is that of those who have experienced a breach only 50% can switch their authentication method within a day compared to more than 68% of those who have not experienced a breach. Could this be because those who have not experienced a breach have better, more proactive defences in the first place? But as figure 2 showed, a third of those with tokenbased authentication systems do not have an alternative method of authentication. Why is this? 8 Token Security or Just Token Security?

9 Awareness of security Why do organisations not have an alternative method of authentication? There are two main reasons that enterprises do not have an alternative method of authentication they could utilise if their token-based approach is breached. Two in five (38%) cite that it is the expense of deploying an alternative solution that deters them from having one. However, the same number (38%) report that they never thought they would need one. This really highlights the naivety of the large enterprises considering that almost a quarter of UK enterprises have experienced a security breach (23%) that compromised their token-based approach. Figure 4: 38% of organisations do not have an alternative method of authentication because they never thought they d need one How well informed is the CEO when it comes to security risks? While a small percentage of respondents said that they don t have an alternative method of authentication because they didn t think they d need one, nine in 10 (90%) senior IT decisionmakers within UK enterprises say that, actually, their CEO and board are well informed when it comes to IT security risks and only 10% believe they are not well informed. And this varies by the size of the organisation; in the larger enterprises more CEOs are seen as being informed about IT security risks, compared to smaller enterprises. There are sector variations too. It appears that those in the manufacturing sector are the least likely to think that their CEO is aware of IT security threats and those in the government have the most faith in their seniors. 38% 4% 38% Figure 5: CEOs in larger organisations are more informed than their counterparts in smaller enterprises 66% 8% 12% 46% The expense of deploying an alternative solution IT doesn't have the bandwidth to manage an alternative We are not aware of the alternatives We never thought we would need one Other Organisations with employees Organisations with more than 3000 employees 9 Token Security or Just Token Security?

10 The importance and security of mobility Two thirds of enterprise organisations realise that the need for mobility is important to their organisation, e.g. all employees are equipped to work remotely using smartphones, laptops and tablets. This appears to be least important to the financial services sector (55%) and most important to the other commercial group (85%). Figure 7: and mobility is important to the customers of 53% of enterprises 14% Not important Figure 6: The need for mobility is important to two thirds of UK enterprises 53% 33% Neither important or not important 13% Important Not important Neither important or not important Important 66% 21% When it comes to mobility in regards to the organisation s customers, a similar outcome is apparent; 53% of senior IT decision-makers cite that mobility is important to customers. And there is a positive correlation here among those who think that mobility is important to their organisation and those who feel that mobility is important to their customers. Figure 8 on page 11 shows that 64% of senior IT decision-makers who consider mobility important to the organisation, also believe it is important to customers (the linear increase in the purple bar in figure 8, alongside the opposing linear decrease in the pink bar). 10 Token Security or Just Token Security?

11 Figure 8: Those who believe mobility is important to the organisation also believe it is important to customers This drops to just half (50%) of those with 1000 to 3000 employees and rises to two thirds (66%) among those with more than 3000 employees. 48% 64% This is almost a mirror image of what we saw in figure 1a, where the larger organisations were more likely to have a token-based authentication system. So, is there a link? 38% 31% 31% Not important to the organisation 19% 33% Neither important or unimportant to the organisation 9% 27% Important to the organisation Not important to customers Neither important or unimportant to customers Important to customers The most popular security method in place for mobile devices entering the corporate network is to request a strong username or password. However, more than half of enterprises use a token-based system. Figure 10: 55% of those who have mobile devices that enter the corporate network use a tokenbased system We can conclude from this that mobility is definitely important to enterprise organisations, but is the security of mobile devices being overlooked? Username/ password Token-based 55% 81% Security of mobile devices Fewer than three out of five IT managers (58%) believe that the mobile devices within their organisation are secure. Knowledgebased questions Grid card None of these 9% 27% 4% Figure 9: Just 58% of UK enterprises believe the mobile devices in their organisation are secure 9% Not secure Considering it was established in figure 1 that 80% of enterprises employ a token-based authentication system, the fact that only 55% use it for mobile devices implies that mobile security may be somewhat of an Achilles heel for organisations. 58% 33% Somewhat secure Secure 11 Token Security or Just Token Security?

12 Conclusions It is clear that despite the majority of UK enterprise organisations having a token-based authentication system, many are still at risk; 33% of those with a token-based system do not have an alternative method of authentication. Further, 36% of organisations would need longer than a day to switch from one method of authentication to another should a breach occur meaning that their defences would be down for a prolonged period of time. And it appears breaches are not an uncommon event 26% of organisations that utilise a token-based authentication system have experienced a breach as a result of identity fraud caused by lost or stolen tokens. The report raises more questions than delivers answers about enterprise security. It is clear that organisations we researched are likely, at some point, to be the victim of an attack. And whilst larger organisations do appear to be more security-aware, it is also the case that the larger the organisation they are likely to be more well-known, have more people working within them and the opportunity for a breach is greater. Therefore, it is much harder for the largest organisations to be 100% secure. If we add the hugely significant factor of mobile device access to this mix, then it is clear that the organisation needs to constantly monitor its security regimen to make a successful attack as unlikely as possible. Senior IT staff have faith in their CEOs and board members though, as all but 10% believe that the CEO and board are well informed about IT security risks. However, this begs several questions; If 90% of CIOs are satisfied that the board and the CEO are aware and informed of security risks then: Why do a third of those with a token-based system not have an alternative method of authentication? (aside from the fact that 38% thought they would never need one ) Why have 26% of organisations with tokenbased authentication systems experienced token-related breaches? Why do only 58% of senior IT decisionmakers think that the mobile devices within their organisations are secure? 12 Token Security or Just Token Security?

13 About Entrust A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organisations spanning 85 countries. Entrust s award-winning software authentication platforms manage today s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eid initiatives, certificate management and SSL. For more information about Entrust products and services, call , [email protected] or visit About Vanson Bourne Vanson Bourne, a specialist research-led consultancy, carries out user research within a technology context. The company interviews senior decision makers from a variety of functions, across a whole range of industries, in organisations from the smallest to the largest, in markets around the globe. Vanson Bourne s clients range from start-ups to well-known companies that need expert guidance, delivering robust and credible research-based analysis. 13 Token Security or Just Token Security?

Entrust IdentityGuard

Entrust IdentityGuard +1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's

More information

Multi-factor authentication

Multi-factor authentication CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

A HELPING HAND TO PROTECT YOUR REPUTATION

A HELPING HAND TO PROTECT YOUR REPUTATION OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION

More information

How To Improve Security In An Organization

How To Improve Security In An Organization Protecting the organization against the unknown A new generation of threats February 2014 Contents Scope of the research 3 Research methodology 3 Aims of the research 3 Summary of key findings 4 IT security

More information

2015 VORMETRIC INSIDER THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security RETAIL EDITION #2015InsiderThreat RESEARCH BRIEF RETAIL CUSTOMERS AT RISK ABOUT THIS RESEARCH BRIEF

More information

Modern two-factor authentication: Easy. Affordable. Secure.

Modern two-factor authentication: Easy. Affordable. Secure. Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks

More information

Corporate Security in 2016.

Corporate Security in 2016. Corporate Security in 2016. A QA Report Study Highlights According to ThreatMetrix, businesses in the UK are at greater risk of cybercrime than any other country in the world. In a recent survey carried

More information

Defending the Internet of Things

Defending the Internet of Things Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Bio-inspired cyber security for your enterprise

Bio-inspired cyber security for your enterprise Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t

More information

Guide to Evaluating Multi-Factor Authentication Solutions

Guide to Evaluating Multi-Factor Authentication Solutions Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor

More information

Network Security Report:

Network Security Report: Network Security Report: The State of Network Security in Schools Managing tight budgets. Complying with regulatory requirements. Supporting Internet-based learning technologies. There are many challenges

More information

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime

More information

Enterprise mobility trends 2015 and beyond

Enterprise mobility trends 2015 and beyond Sponsored by >> Whitepaper Enterprise mobility trends 2015 and beyond How to best manage mobile in the workplace and deal with challenges from current and emerging technologies FEBRUARY 2015 resources

More information

White Paper. The Principles of Tokenless Two-Factor Authentication

White Paper. The Principles of Tokenless Two-Factor Authentication White Paper The Principles of Tokenless Two-Factor Authentication Table of contents Instroduction... 2 What is two-factor authentification?... 2 Access by hardware token... 3 Advantages and disadvantages

More information

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

More information

Top 5 Reasons to Choose User-Friendly Strong Authentication

Top 5 Reasons to Choose User-Friendly Strong Authentication SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts

More information

AB 1149 Compliance: Data Security Best Practices

AB 1149 Compliance: Data Security Best Practices AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California

More information

WHITE PAPER. Let s do BI (Biometric Identification)

WHITE PAPER. Let s do BI (Biometric Identification) WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an

More information

ITAR Compliance Best Practices Guide

ITAR Compliance Best Practices Guide ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It

Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It WHITE PAPER: DON T LOSE THE DATA: SIX WAYS YOU MAY BE LOSING........ MOBILE....... DATA......................... Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It Who should

More information

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies

More information

How Secure is your Authentication Technology?

How Secure is your Authentication Technology? How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any

More information

Session 11 : (additional) Cloud Computing Advantages and Disadvantages

Session 11 : (additional) Cloud Computing Advantages and Disadvantages INFORMATION STRATEGY Session 11 : (additional) Cloud Computing Advantages and Disadvantages Tharaka Tennekoon B.Sc (Hons) Computing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Cloud

More information

Internet Banking Attacks. Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic) [email protected]

Internet Banking Attacks. Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic) miko@dcit.cz Internet Banking Attacks Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic) [email protected] Contents Agenda Internet banking today The most common attack vectors The possible countermeasures What protection

More information

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime

More information

Multi-Factor Authentication

Multi-Factor Authentication Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to

More information

A strategic approach to fraud

A strategic approach to fraud A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for

More information

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA) Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

How to reduce the cost and complexity of two factor authentication

How to reduce the cost and complexity of two factor authentication WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership

More information

Securing Virtual Desktop Infrastructures with Strong Authentication

Securing Virtual Desktop Infrastructures with Strong Authentication Securing Virtual Desktop Infrastructures with Strong Authentication whitepaper Contents VDI Access Security Loopholes... 2 Secure Access to Virtual Desktop Infrastructures... 3 Assessing Strong Authentication

More information

White Paper. Enhancing Website Security with Algorithm Agility

White Paper. Enhancing Website Security with Algorithm Agility ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today

More information

The Future of Network Security Sophos 2012 Network Security Survey

The Future of Network Security Sophos 2012 Network Security Survey The Future of Network Security Sophos 2012 Network Security Survey Sophos and Vanson Bourne surveyed 571 IT decision makers globally to gain a deeper understanding of how IT teams are responding to technology

More information

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

THE REALITY OF CLOUD COMPUTING HAS IT LIVED UP TO THE HYPE?

THE REALITY OF CLOUD COMPUTING HAS IT LIVED UP TO THE HYPE? DATA CENTRE & CLOUD SERVICES WHITEPAPER THE REALITY OF CLOUD COMPUTING HAS IT LIVED UP TO THE HYPE? TABLE OF CONTENTS 1. Introduction......................... 2 2. Key findings........................

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

research report: field service, mobility & the cloud

research report: field service, mobility & the cloud research report: field service, mobility & the cloud An exclusive Field Service News research report exploring if, how and why field service companies are using the Cloud and mobile in 2015 FIELD SERVICE

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

Entrust Smartcard & USB Authentication

Entrust Smartcard & USB Authentication Entrust Smartcard & USB Authentication Technical Specifications Entrust IdentityGuard smartcard- and USB-based devices allow organizations to leverage strong certificate-based authentication of user identities

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial

More information

Strong Authentication for Healthcare

Strong Authentication for Healthcare Strong Authentication for Healthcare Entrust Solutions for Centers for Medicare & Medicaid Services Authentication Compliance Entrust Inc. All All Rights Reserved. 1 1 Entrust is a registered trademark

More information

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

Longmai Mobile PKI Solution

Longmai Mobile PKI Solution Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

Two-Factor Authentication and Swivel

Two-Factor Authentication and Swivel Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide

More information

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper Access Control in Commercial Applications Is the future of commercial building security built in, or bolted on? A discussion paper Author: Damian Marsh, Managing Director UK, ASSA ABLOY Access Control

More information

Encryption, Key Management, and Consolidation in Today s Data Center

Encryption, Key Management, and Consolidation in Today s Data Center Encryption, Key Management, and Consolidation in Today s Data Center Unlocking the Potential of Data Center Consolidation whitepaper Executive Summary Today, organizations leadership teams are striving

More information

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.

More information

The Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers

The Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers The Business Impact of the Cloud According to 460 Senior Financial Decision-Makers March 2012 Contents Summary of key findings 4 Finance decision-makers have a high awareness of cloud computing 4 The majority

More information

Ensuring security the last barrier to Cloud adoption

Ensuring security the last barrier to Cloud adoption Ensuring security the last barrier to Cloud adoption Publication date: March 2011 Ensuring security the last barrier to Cloud adoption Cloud computing has powerful attractions for the organisation. It

More information

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY INSTEAD OF A SECURITY PROBLEM, ENDPOINTS BECOME PART OF THE SECURITY SOLUTION SUMMARY The internet and mobility have made enterprise

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

The Recover Report. It s business. But it s personal.

The Recover Report. It s business. But it s personal. The Recover Report It s business. But it s personal. Executive summary The Recover Report The perpetrators This report examines a sample of 150 data theft cases handled by Mishcon de Reya. Our research

More information

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Private-Key Duplication

Private-Key Duplication Private-Key Duplication The safe use of wildcard and multi-server certificates Get this White Paper Entrust Inc. All Rights Reserved. Entrust Inc. All Rights Reserved. 1 1 Contents Background... 3 Multi-Server

More information

ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics

ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics MicroStrategy Analytics: Delivering Secure Enterprise Analytics Copyright Information All Contents Copyright 2015 MicroStrategy Incorporated. All Rights Reserved. Trademark Information MicroStrategy, MicroStrategy

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction

More information

Industry. Head of Research Service Desk Institute

Industry. Head of Research Service Desk Institute Asset Management in the ITSM Industry Prepared by Daniel Wood Head of Research Service Desk Institute Sponsored by Declaration We believe the information in this document to be accurate, relevant and truthful

More information

EasiShare Whitepaper - Empowering Your Mobile Workforce

EasiShare Whitepaper - Empowering Your Mobile Workforce Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for

More information

PCI DSS COMPLIANCE DATA

PCI DSS COMPLIANCE DATA PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date 04 07 2014. Page 1 Public

REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date 04 07 2014. Page 1 Public REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION SD045 V4.1 Issue Date 04 07 2014 Page 1 Public 1) SERVICE OVERVIEW 1.1) SERVICE OVERVIEW Redcentric s N3 Secure Remote Access (N3-SRA) Service offers

More information

Five Trends to Track in E-Commerce Fraud

Five Trends to Track in E-Commerce Fraud Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other

More information

White Paper. The risks of authenticating with digital certificates exposed

White Paper. The risks of authenticating with digital certificates exposed White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric

More information

TECHNOLOGY WHITEPAPER

TECHNOLOGY WHITEPAPER TECHNOLOGY WHITEPAPER Securing Citizen Self-Service for Government AURAYA SYSTEMS One Tara Boulevard Nashua, New Hampshire 03062 +1 603 123 7654 twitter.com/armorvox linkedin/in/armorvox Securing Citizen

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information