SecureAuth homes in on BYOD management and mobile app access Analyst: Steve Coplan 16 Apr, 2012 Securing access to enterprise applications from smartphones and mobile tablets has percolated to the top of the average CISO's to-do list. And, with the new class of tablets (whether Android or Apple ios devices), it's become apparent that managing the device is only part of the story. The challenge is as much bringing the devices under enterprise management as it is contending with the topology created by a set of vectors including SaaS application adoption and the shifting composition of the user population. As we outlined in a recent spotlight, with the advent of shared endpoints, shared Internet use and multiple cloud and hosting services, the enterprise is becoming more of an idea rather than a concrete entity a verb rather than a noun. For the moment, the response by enterprises to the BYOD wave has largely been tactical even as larger vendors make investments through acquisitions to eventually address the trend strategically. Enterprises have looked to enroll employee devices within existing management frameworks, contending with certificate management challenges, as well as providing a dedicated mobile access portal or app that isolates session with enterprise resources. Authentication in these scenarios is directed against an enterprise store, so that a set of internal credentials can be used for sessions initiated from a mobile device. A longtime player in the integrated authentication, federated identity and SSO market, SecureAuth like its peers views the disruption to traditional topologies as an opportunity to introduce a new access management model. SecureAuth is, however, one of the few vendors in the space that combines authentication mapping with native certificate management, allowing it to deal with both certificate management and securing access to what is sure to be the most prevalent use case for mobile tablets: Microsoft Exchange email. Still small but growing at a rapid clip, mobile access management for cloud-based applications could set SecureAuth on a steeper trajectory. Copyright 2013 - The 451 Group 1
The 451 Take We have seen the view that mobile is not simply an incremental management and security use case, but a fundamental shift in enterprise IT, swiftly take hold. The BYOD wave certainly strains the limits of mobile device management, and quickly shifts the focus to securing the user and the application. But as IT managers struggle to come to terms to with it, will they take a tactical path to incorporate mobile device access, wait for incumbents to assimilate their acquisitions or revisit their access management assumptions in tandem with SaaS adoption? SecureAuth needs to be able to play all these angles to make the most of the opportunity. Context SecureAuth IdP is deployed as an appliance that effectively acts as a front end for the enterprise directory and validates both user credentials and software tokens against a directory entry in an encrypted three-step process. Rather than use cookies or an embedded agent to serve as the mechanism for software-based authentication, SecureAuth uses managed code based on client-side SSL encryption, which also serves to limit the man-in-the-middle attacks on the end-user side, and limit phishing of user credentials from the server side. The enrollment is user-initiated, based on a one-time activation with no administrative privileges required for registration of the client. SecureAuth describes its architecture as a 'funnel' that takes in a range of authentication inputs whether it's a SAML assertion, an OAUTH token, a Kerberos ticket associated with a set of Active Directory credentials or a RADIUS login and then maps that authentication artifact to a set of application authorizations. While a not-insubstantial proportion of its business is generated with straightforward replacement of hardware tokens used for well-established use cases like remote access through SSL VPNs based on cost and administrative overhead, taking the next step toward SaaS access management is increasingly featuring as a driver for technology acquisition. Typically, organizations are looking to manage access to Saas applications as well as propagate identities and synchronize policies across third-party services based on internal logic. We have described this as an 'enterprise out' approach. The question that mobile raises is how to bring mobile devices that are not resident on the network, or directly associated with a specific user profile, into existing access management frameworks especially authoritative stores like Microsoft Active Directory. Technology Although mobile and mobile computing ultimately combine to undermine the assumptions that underlie existing security and management approaches (as we have outlined in a recent spotlight), this process will play out over time. Instead, enterprises are wrestling with ways to enable access from tablets and mobile devices while meeting security, access controls, visibility and compliance reporting requirements. For vendors providing authentication, federated identity and SSO, this presents an opportunity, but one that requires deeper hooks into the mobile environment to exploit. The fundamental issue that IT departments and security teams face with BYOD (bring your own device) is that they cannot stand in the way of mobile adoption both because of user preferences, and because there are obvious productivity gains for the organizations. However, mobile adoption generates two major issues: there is no direct control over the device by IT or security, and traditional enforcement of on-device data use and applications can't be readily extended to employee devices accessing corporate resources. One approach is, of course, to implement mobile device management which is certainly the direction that many Copyright 2013 - The 451 Group 3
large organizations have already moved in. But even as mobile proliferation (especially of Apple ios and Google Android devices) has lifted the fortunes of MDM vendors, and drawn in larger IT vendors like HP, IBM and Symantec, the scope is still largely around the device itself, rather than the applications or the user profile. And even as many vendors look to create self-contained execution environments to run enterprise applications, there is still the need to authenticate mobile users against an authoritative enterprise user store and associate the device with a particular user. Some enterprises have gone down the path of creating a portal specifically for access to mobile applications, which serves the purpose of segmenting out a set of applications that can be accessed from mobile devices, but can err on the side of being overly prescriptive, and still creates the need to systematically manage access requests, authorizations as well as authentication. Email is of course the most widely used productivity application and expanding accessibility generates clear productivity gains. This makes email access from mobile devices probably the most pressing issue for IT security and managers. And since Microsoft Exchange is the most prevalent email platform, that means coming to terms with Exchange Active Sync. Exchange ActiveSync (EAS) is an XML-based protocol that has been extant for several years for synchronization from a messaging server to a mobile device. The issue that enterprises immediately encounter with ActiveSync is that the protocol makes use of a Microsoft Kerberos token for authentication, and synchronization hinges off a set of Microsoft AD Group Policies. This is clearly an integration challenge for Apple ios or Google Android devices. SecureAuth had already launched a set of capabilities for supporting SSO from Apple ios and Google Android mobile devices (building on existing mobile OS support), as well as automated enrollment and management of X.509 device-side certificates. Now the company has looked to extend those capabilities to bridge ios device-side certificates with Microsoft infrastructure through its 'funnel.' In this scenario, SecureAuth serves to broker the ios profiles, and the Microsoft Kerberos tokens that govern ActiveSync. The value proposition is that enterprises can maintain a user profile on the device, while users get the benefit of access from the mobile device of their choice. The use case is significant not just because it illustrates the strengths of SecureAuth's platform. It also allows the company to position itself as a substitute for mobile device management for smartphones and mobile tablets, as well as establish a strategic footprint as enterprises migrate from Exchange to GoogleApps. SecureAuth already has partnerships in place with GoogleApps specialist systems integrator Agusto Systems for implementing access management to the set of SaaS applications. With the ActiveSync capability in place, SecureAuth can also facilitate the migration from Exchange to GoogleApps, and maintain the user experience even as it expands coverage to BYOD devices. However, the market is a hotly contested one, and functionality is only one element in the equation. Competition SecureAuth's competitive landscape can be segmented into the new breed of authentication vendors (especially those integrating SSO and authentication), incumbent authentication vendors it is looking to replace hardware tokens for use cases like remote access, and players in the identity-in-the-cloud arena looking toward SaaS access management. To that list we would add companies making a move to subsume some mobile device management functionality where we have already seen incumbent players like IBM, Symantec and SAP make their moves. SecureAuth would not necessarily compete with out-of-bound authentication providers like PhoneFactor or SMS PASSCODE, and in fact would argue that its platform is designed to integrate with third-party authentication methods. However, the company would consider hardware tokens from EMC security division RSA to be a primary replacement target. Symantec has certainly made its strategic goals explicit in the mobile security realm with the recent acquisitions of Odyssey Software and Nukona. For Symantec, the strategic goal is to bring together device management (which was bolstered by the Odyssey acquisition), mobile anti-malware, application management (where Nukona fits in) and management of Web-based mobile apps. Also, where the opportunity is replacement of hardware tokens in the first instance, we would frame CA Technologies' CloudMinder and Symantec's VIP service as significant players (Symantec's O3 initiative and Copyright 2013 - The 451 Group 4
parallel mobile acquisitions could point to the vendor becoming a significant presence in mobile access management). Both vendors have seen significant growth over the past 12 months. We would certainly position Intel-McAfee's Cloud SSO service that integrates on-demand one-time password authentication, federation and SSO to SaaS applications. Equally, we see Okta, and Ping Identity with its newly launched CloudDesktop portal capabilities, as significant competitors for SaaS access management. SecureAuth argues that it encounters Okta and its platform-native authentication options including a branded mobile endpoint soft token mostly in smaller accounts. Okta counters that it sees SecureAuth in prospects where the primary requirement is replacement of hardware tokens. Ping, on the other hand, has only recently made its presence felt in the market, but does have a strong brand and integrated mobile and OAuth services. In the area of mobile certificate management, we have already seen Centrify weigh in with its DirectControl for Mobile. DirectControl for Mobile is designed to authenticate, control and manage smartphones and tablets (principally Apple ios, Google Android) through a set of Microsoft Active Directory extensions. Joining the devices to internal policies through authentication to Microsoft AD allows organizations through AD Group Policy and AD Users and Computers policies to centrally define which devices are assigned to a user, the properties of each device, which corporate applications can run on mobile devices, and how those devices can access corporate networks and resources, and remotely lock and wipe mobile devices. The distinction here is the point of departure. Centrify is still primarily a management company, rather than an identity management player. But as Centrify moves into SaaS access management, more direct competition could ensue. We also see mobile device management vendors coming at the market requirement in conjunction with partners for credential management, specifically Echoworx in order to associate a device with a digital certificate, and manage certificates within their framework. However, SecureAuth has long been able to demonstrate how its platform overcomes the limitations of PKI infrastructure. Microsoft security software specialist Certified Security Solutions has also launched a product to enroll ios devices and centrally manage device-side certificates. SWOT Analysis Strengths Weaknesses SecureAuth has a specific value proposition for a mobile application use case that is large and prevalent and one that builds on its platform's strengths. The company is still fighting a perception problem as an authentication specialist. Opportunities Threats Mobile is both a tactical sales opportunity and a strategic play. Still, the transformation of an identity from within the four walls of an enterprise to a portable, logical entity encapsulated in a trust model presents a broad and horizontal opportunity. Even as SecureAuth sees its revenue expand, the window of opportunity is being compressed by new market entrants incumbents and insurgents alike. Copyright 2013 - The 451 Group 5
Reproduced by permission of The 451 Group; 2013. This report was originally published within 451 Research s Market Insight Service. For additional information on 451 Research or to apply for trial access, go to: www.451research.com Copyright 2013 - The 451 Group 6