Analytics
11/14/2012
08:10 PM
Don Bailey
Don Bailey
Products and Releases
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Forrester Survey: Wary Enterprises Still Place Sensitive Data In The Cloud

User provisioning and SSO/Web access management the two leading access-control priorities for enterprises

BOULDER, Colo., Nov. 14, 2012 - Symplified, the Cloud Identity Company, today released new research that shows one third of enterprises place highly sensitive data in the public cloud even though most are wary of the implications on security and other business processes. The findings -- from an independent August 2012 commissioned study conducted by Forrester Consulting on behalf of Symplified -- of US enterprise IT security managers, also found that nearly half of respondents do not think their existing identity and access management (IAM) infrastructures will be able to support cloud applications and provide single sign-on (SSO).

According to the study entitled "Access Management for the Extended Enterprise: A Timely Challenge," while most enterprises are concerned about exposing data to the cloud, nearly a third of them already place highly sensitive data like regulated financial (34%) and healthcare information (29%) in SaaS apps. As for their preferred method for consuming cloud security, the top two choices - embedded in the cloud service (23%) and third-party on-premise solution (20%) - were evenly split.

"The data collected shows that IT managers are living with a gap between cloud usage and corresponding cloud security. As solutions for managing cloud access mature, we anticipate IT departments will feel corresponding pressure to improve the fundamental processes of identity management and access management within their own organizations," said the study. "They must increasingly support business owners in a drive to take advantage of cloud-enabled and mobile-enabled business partnerships - and their ability to execute will be significantly affected by the ability of their IAM systems to adapt."

Key Survey Findings

Forrester Consulting identified the following key IAM trends:

. User Provisioning (61%) and SSO/Web Access Management (53%) are the two leading access control priorities for enterprises

. 52% of enterprises are very concerned or somewhat concerned that their attestation and access request processes won't fit with their cloud IAM solution

. 52% were very concerned or somewhat concerned that their infrastructure is not up to date to support cloud IAM protocols

. 48% of respondents were very concerned or somewhat concerned that their organization needs SSO to non-SAML or non-federated SaaS apps

. 38% were very concerned or somewhat concerned that their existing IAM infrastructure is incompatible with their cloud IAM solution

"This survey reveals that enterprises recognize the need for cloud identity and access management, but they're concerned about their ability to integrate these capabilities within existing infrastructures," said Brian Czarny, vice president of marketing for Symplified. "It's also clear that supporting non-SAML apps is a big challenge, and that organizations want the ability to choose between cloud-based and on-premises security options."

Symplified will host a free webinar presenting an in-depth analysis of the Forrester Consulting findings featuring Forrester Research, Inc., principal analyst Eve Maler. The webinar will take place on Thursday, Nov. 29 at 11am Mountain Time. To register, click here.

About Symplified | The Cloud Identity Company

Symplified provides seamless single sign-on, identity and access management services to help enterprises around the world safely and securely connect users to cloud, web and mobile applications. Symplified is headquartered in Boulder, Colorado and can be found on the Web at www.symplified.com. Don A. Bailey is a pioneer in security for mobile technology, the Internet of Things, and embedded systems. He has a long history of ground-breaking research, protecting mobile users from worldwide tracking systems, securing automobiles from remote attack, and mitigating ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2003-1598
Published: 2014-10-01
SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable.

CVE-2011-4624
Published: 2014-10-01
Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.

CVE-2012-0811
Published: 2014-10-01
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files gene...

CVE-2014-2640
Published: 2014-10-01
Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) before 7.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2014-2641
Published: 2014-10-01
Cross-site request forgery (CSRF) vulnerability in HP System Management Homepage (SMH) before 7.4 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Chris Hadnagy, who hosts the annual Social Engineering Capture the Flag Contest at DEF CON, will discuss the latest trends attackers are using.