Analytics
11/14/2012
08:10 PM
Don Bailey
Don Bailey
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Forrester Survey: Wary Enterprises Still Place Sensitive Data In The Cloud

User provisioning and SSO/Web access management the two leading access-control priorities for enterprises

BOULDER, Colo., Nov. 14, 2012 - Symplified, the Cloud Identity Company, today released new research that shows one third of enterprises place highly sensitive data in the public cloud even though most are wary of the implications on security and other business processes. The findings -- from an independent August 2012 commissioned study conducted by Forrester Consulting on behalf of Symplified -- of US enterprise IT security managers, also found that nearly half of respondents do not think their existing identity and access management (IAM) infrastructures will be able to support cloud applications and provide single sign-on (SSO).

According to the study entitled "Access Management for the Extended Enterprise: A Timely Challenge," while most enterprises are concerned about exposing data to the cloud, nearly a third of them already place highly sensitive data like regulated financial (34%) and healthcare information (29%) in SaaS apps. As for their preferred method for consuming cloud security, the top two choices - embedded in the cloud service (23%) and third-party on-premise solution (20%) - were evenly split.

"The data collected shows that IT managers are living with a gap between cloud usage and corresponding cloud security. As solutions for managing cloud access mature, we anticipate IT departments will feel corresponding pressure to improve the fundamental processes of identity management and access management within their own organizations," said the study. "They must increasingly support business owners in a drive to take advantage of cloud-enabled and mobile-enabled business partnerships - and their ability to execute will be significantly affected by the ability of their IAM systems to adapt."

Key Survey Findings

Forrester Consulting identified the following key IAM trends:

. User Provisioning (61%) and SSO/Web Access Management (53%) are the two leading access control priorities for enterprises

. 52% of enterprises are very concerned or somewhat concerned that their attestation and access request processes won't fit with their cloud IAM solution

. 52% were very concerned or somewhat concerned that their infrastructure is not up to date to support cloud IAM protocols

. 48% of respondents were very concerned or somewhat concerned that their organization needs SSO to non-SAML or non-federated SaaS apps

. 38% were very concerned or somewhat concerned that their existing IAM infrastructure is incompatible with their cloud IAM solution

"This survey reveals that enterprises recognize the need for cloud identity and access management, but they're concerned about their ability to integrate these capabilities within existing infrastructures," said Brian Czarny, vice president of marketing for Symplified. "It's also clear that supporting non-SAML apps is a big challenge, and that organizations want the ability to choose between cloud-based and on-premises security options."

Symplified will host a free webinar presenting an in-depth analysis of the Forrester Consulting findings featuring Forrester Research, Inc., principal analyst Eve Maler. The webinar will take place on Thursday, Nov. 29 at 11am Mountain Time. To register, click here.

About Symplified | The Cloud Identity Company

Symplified provides seamless single sign-on, identity and access management services to help enterprises around the world safely and securely connect users to cloud, web and mobile applications. Symplified is headquartered in Boulder, Colorado and can be found on the Web at www.symplified.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.