pingidentity.com IDENTITY SECURITY TRENDS IN THE MOBILE ERA



Similar documents
Connecting Users with Identity as a Service

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com

Customer Identity and Access Management (CIAM) Buyer s Guide

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Pick Your Identity Bridge

CA Single Sign-On Migration Guide

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

OpenID Connect 1.0 for Enterprise

A Standards-based Mobile Application IdM Architecture

Glinda Cummings World Wide Tivoli Security Product Manager

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Extend and Enhance AD FS

Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk

How to Extend Identity Security to Your APIs

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson

expanding web single sign-on to cloud and mobile environments agility made possible

People-Focused Access Management. Software Consulting Support Services

CA Technologies Empowers Employees with Better Access to Applications via OneAccess Mobile App

The Who, What, When, Where and Why of IAM Bob Bentley

An Enterprise Architect s Guide to API Integration for ESB and SOA

Authentication Strategy: Balancing Security and Convenience

Executive Buyer s Guide to Identity and Access Management Solutions

SOLUTION BRIEF SEPTEMBER Healthcare Security Solutions: Protecting your Organization, Patients, and Information

Cisco Software-as-a-Service (SaaS) Access Control

The Top 5 Federated Single Sign-On Scenarios

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

managing SSO with shared credentials

ADOBE EXPERIENCE MANAGER MOBILE. for Financial Services

STRONGER AUTHENTICATION for CA SiteMinder

Beyond passwords: Protect the mobile enterprise with smarter security solutions

AIMING HIGHER: CREATE A MOBILE- FIRST BUSINESS STRATEGY

Google Identity Services for work

Introduction to SAML

EDUCAUSE Security Presentation. Chad Rabideau Senior Consultant Identity Management AegisUSA

Identity. Provide. ...to Office 365 & Beyond

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things

Moving Beyond User Names & Passwords Okta Inc. info@okta.com

OFFICE 365 & SALESFORCE

Understanding Enterprise Cloud Governance

Security Services. Benefits. The CA Advantage. Overview

BYE BYE PASSWORDS. The Future of Online Identity. Hans Zandbelt Sr. Technical Architect. CTO Office - Ping Identity

SAML 101. Executive Overview WHITE PAPER

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

ipass Unlimited 1. Introduction 2. Challenges and Trends

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

WHITE PAPER Usher Mobile Identity Platform

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.

Enabling SSO for native applications

Why Endpoint Backup Is More Critical Than Ever

The CIO of the Future Research Report

Securicom (MDM) Mobile Device Management

Cloud Security: Is It Safe To Go In Yet?

Flexible Identity Federation

Citrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.

ADOBE EXPERIENCE MANAGER MOBILE. for Healthcare

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY

How To Get A Cloud Service For A Small Business

E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s

Moving Beyond User Names & Passwords

The Myths & Truths of Enterprise Mobile Printing: 9 ways PrintMe Mobile sets the truth and your IT department free.

Cybersecurity report As technology evolves, new risks drive innovation in cybersecurity

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Magellan. 5 Simple Steps to Finding the Right Mobile Development Magellan Holdings, LLC.

Delivering value to the business with IAM

CA Federation Manager

5 Pillars of API Management with CA Technologies

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

API-Security Gateway Dirk Krafzig

Mobility and cloud transform access and delivery of apps, desktops and data

Junos Space for Android: Manage Your Network on the Go

The Primer: Nuts and Bolts of Federated Identity Management

Identity Relationship Management

Simple Cloud Identity Management (SCIM)

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Transcription:

pingidentity.com IDENTITY SECURITY TRENDS IN THE MOBILE ERA

CONTENTS TRENDS IN IDENTITY SECURITY 3 INSIGHT #1 4 PRODUCTIVITY AND USER EXPERIENCE TRUMP EVERYTHING ELSE INSIGHT #2 5 SECURITY IS BOTH A LEADING DRIVER AND A CHALLENGE FOR MOBILE INITIATIVES INSIGHT #3 7 EXECS SEE MOBILE DEVICES AS KEY TO THE POST-PASSWORD ERA INSIGHT #4 8 ENTERPRISES ARE SEEKING A SINGLE IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEM FOR WEB, API AND MOBILE ACCESS LET S REVIEW 9 INSIGHTS POINT TO FEDERATED IDENTITY AND ACCESS MANAGEMENT APPENDIX 10 PARTICIPANT PROFILE Sources 1 Gartner, Predicts 2014: Identity and Access Management, 26 November 2013, Analyst(s): Ray Wagner, Earl Perkins, Gregg Kreizman, Felix Gaehtgens, Ant Allan

The business landscape has changed dramatically within just the past five years. Mobile devices, which are effectively powerful personal computers, are everywhere and possess enormous business potential. Gartner states that, By year-end 2020, 80% of user access will be shaped by new mobile and non-pc architectures that service all identity types regardless of origin 1. Additionally, IDC estimates that 55 percent of all smartphones used in business will be employee-owned in 2015. These and other statistics have most enterprises struggling with a host of issues surrounding the use and security of mobile devices for work. To better understand the mindset and priorities of those who make security decisions for mobile devices in the workplace, Ping Identity conducted a mobility survey in partnership with Gatepoint Research. The results shed light on four main insights into the top challenges and motivations for enterprise mobile initiatives. TRENDS IN IDENTITY SECURITY 3

INSIGHT #1 PRODUCTIVITY AND USER EXPERIENCE TRUMP EVERYTHING ELSE WHAT ARE YOUR DEVELOPMENT GOALS FOR MOBILE APPLICATIONS? Improved user experience regarding access/login 89% Improved user productivity 88% Secure, auditable and compliant access to data 83% Faster time to value 82% Reduce current and future costs of securing mobile apps 79% Faster time to market 72% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Eighty-nine percent of respondents cite improved user experience as the top development goal for mobile applications. They know that user experience is king. Whether rolling out mobile apps to your workforce or your customers, users expect a great experience and an app that adds value quickly. Deliver less, and your brand will suffer. Eighty-eight percent say the top development goal for mobile applications is improved user productivity. Leading enterprises have discovered that a mobile workforce is a more productive and satisfied one. We want to continue to provide our customers with exceptional customer experiences and that means engaging with them where they are conveniently over their smartphones, tablets or the Internet. Eric Barnes, Application Development Manager, Wawa Inc. Learn more about how WaWa is Staying a Step Ahead of On-the- Go Customers. 4

INSIGHT #2 SECURITY IS BOTH A LEADING DRIVER AND A CHALLENGE FOR MOBILE INITIATIVES WHAT ARE YOUR DEVELOPMENT GOALS FOR MOBILE APPLICATIONS? Improved user experience regarding access/login 89% Improved user productivity 88% Secure, auditable and compliant access to data 83% Faster time to value 82% Reduce current and future costs of securing mobile apps 79% Faster time to market 72% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% When respondents were asked about their goals for mobile applications, Secure, auditable, and compliant access to data was cited 83 percent of the time. This was the third most common goal stated, just behind productivity and user experience. 5

SECURITY IS BOTH A LEADING DRIVER AND A CHALLENGE FOR MOBILE INITIATIVES (cont.) WHAT ISSUES CONSTRAIN YOUR ABILITY TO PROVIDE GREATER MOBILE ACCESS? Securing issues over devices caching passwords locally 71% Multiple policy stores for web and mobile access controls Inability to scale mobile app development without higher security risks Inability to scale mobile app development cost effectively Inability to report on who accessed what data 66% 66% 63% 59% Inability to control access 52% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% When participants were asked about the issues that constrain their rollout of mobile applications, 71 percent said that, Security issues over devices caching passwords locally was a significant concern. Next on the list of issues was, Inability to scale mobile app development without higher security risks. As the participants know, mobile devices pose a unique set of threats to enterprise security. Because the nature of mobile devices, bidirectional access to data occurs beyond the protection of the firewall. And in most cases, passwords are stored directly on the device exposing the enterprise to risk when a device is stolen or lost. They want to scale their mobile application development to meet the needs of the app economy, but they need to ensure that security scales with their mobile app development needs. Read about how Land O Lakes rolled out simple secure access to mobile apps. 6

INSIGHT #3 EXECS SEE MOBILE DEVICES AS KEY TO THE POST-PASSWORD ERA WHAT ARE YOUR GOALS FOR YOUR MOBILE INITIATIVES? Securing issues over devices caching passwords locally 49% Multiple policy stores for web and mobile access controls 47% Inability to scale mobile app development without higher security risks 39% Inability to scale mobile app development cost effectively 29% Inability to report on who accessed what data 9% Inability to control access 6% 0% 10% 20% 30% 40% 50% 60% Almost 40 percent of the participants see mobile platforms as a way to provide multi-factor or strong authentication as a means to improving security. In addition, they re seeking simpler, more innovative and lower-cost ways to handle multi-factor authentication through the use of mobile device applications. era and for good reasons. Among other problems with passwords, the main cause of security breaches and hacks is stolen credentials. Learn more about transforming smartphones into mobile authentication devices. The goal of using mobile devices for strong authentication is proof that enterprise reliance on passwords as a primary authentication method is starting to break down. They re moving toward the post-password 7

INSIGHT #4 ENTERPRISES ARE SEEKING A SINGLE IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEM FOR WEB, API AND MOBILE ACCESS WHAT ARE YOUR GOALS FOR YOUR MOBILE INITIATIVES? Single system for web, API and mobile 55% Secure single sign-on for native mobile apps and web apps 51% Flexible deployment options 49% Standards-based mobile access management and security (OAuth 2.0, OpenID Connect) 46% 0% 10% 20% 30% 40% 50% 60% Support for web, API and mobile access was the most common goal cited for future mobile access. This all-of-the-above approach clearly provides the most flexibility to meet current and future employee and customer needs for productivity and user experience. But what about security? Respondents answered that in the following question, where they indicated that a single system that supported web, API and mobile authentication and authorization was the most desirable attribute of an IAM solution. Read about a modern architecture for identity management. 8

LET S REVIEW INSIGHTS POINT TO FEDERATED IDENTITY AND ACCESS MANAGEMENT Productivity and user experience trump everything else. Execs see mobile devices as a possible solution to insecure passwords. 1 2 3 4 Security is both a leading driver and challenge for mobile initiatives. Enterprises are seeking a single identity and access management (IAM) system for web, API and mobile access. These insights underscore the value of a federated identity and access management (IAM) system, which is the core of Ping Identity s solution. Such a solution simplifies and secures the ugly, complex, heterogeneous world of enterprise IT. The Ping Identity platform addresses all four insights and more: SSO boosts productivity and improves user experience Mobile SSO and API security provides a scalable framework to make mobile devices and apps secure and productive Mobile MFA transforms a mobile device into a second-factor authentication method Based on standards engineered to secure web, mobile, and API security with open standards Go to pingidentity.com to learn more about how you can address the business insights and trends of this decade and the next. 9

APPENDIX PARTICIPANT PROFILE Participants of the survey represent a wide range of industries, decision-making roles and budgets. One hundred perfect of responders participated voluntarily; none were engaged using telemarketing. Manager 23% CxO 14% VP 15% High Tech Management 11% Director 47% Healthcare 28% Business Services 19% Job Level: Survey participants represent senior management and executives in decision-making roles. Retail Trade 22% Financial Services 20% Yes 18% Industry Sector: Survey participants represent firms from a wide range of industries. Forty-five percent are in the Fortune 1000. No 50% Not sure 32% <$250 million 6% $250 million - $500 million 19% $500 million - $1.5 billion 23% >$1.5 billion 45% Use of WAM for Mobile App Initiatives: Fifty percent of participants admit that they don t currently leverage a web access management (WAM) infrastructure to support mobile app development. Revenue: Participants represent firms with a well stratified range of revenues. About Ping Identity The Identity Security Company Ping Identity is the leader in Identity Defined Security for the borderless enterprise, allowing employees, customers and partners access to the applications they need. Protecting over one billion identities worldwide, the company ensures the right people access the right things, securely and seamlessly. More than half of the Fortune 100, including Boeing, Cisco, Disney, GE, Kraft Foods, TIAA-CREF and Walgreens, trust Ping Identity to solve modern enterprise security challenges created by their use of cloud, mobile, APIs and IoT. Visit pingidentity.com. Copyright 2015 Ping Identity Corporation. All rights reserved. Ping Identity, PingFederate, PingOne, PingAccess, PingID, their respective product marks, the Ping Identity trademark logo, and PingCon are trademarks, or servicemarks of Ping Identity Corporation. All other product and service names mentioned are the trademarks of their respective companies. 0715.01 10