Analytics
11/14/2012
08:10 PM
Don Bailey
Don Bailey
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Forrester Survey: Wary Enterprises Still Place Sensitive Data In The Cloud

User provisioning and SSO/Web access management the two leading access-control priorities for enterprises

BOULDER, Colo., Nov. 14, 2012 - Symplified, the Cloud Identity Company, today released new research that shows one third of enterprises place highly sensitive data in the public cloud even though most are wary of the implications on security and other business processes. The findings -- from an independent August 2012 commissioned study conducted by Forrester Consulting on behalf of Symplified -- of US enterprise IT security managers, also found that nearly half of respondents do not think their existing identity and access management (IAM) infrastructures will be able to support cloud applications and provide single sign-on (SSO).

According to the study entitled "Access Management for the Extended Enterprise: A Timely Challenge," while most enterprises are concerned about exposing data to the cloud, nearly a third of them already place highly sensitive data like regulated financial (34%) and healthcare information (29%) in SaaS apps. As for their preferred method for consuming cloud security, the top two choices - embedded in the cloud service (23%) and third-party on-premise solution (20%) - were evenly split.

"The data collected shows that IT managers are living with a gap between cloud usage and corresponding cloud security. As solutions for managing cloud access mature, we anticipate IT departments will feel corresponding pressure to improve the fundamental processes of identity management and access management within their own organizations," said the study. "They must increasingly support business owners in a drive to take advantage of cloud-enabled and mobile-enabled business partnerships - and their ability to execute will be significantly affected by the ability of their IAM systems to adapt."

Key Survey Findings

Forrester Consulting identified the following key IAM trends:

. User Provisioning (61%) and SSO/Web Access Management (53%) are the two leading access control priorities for enterprises

. 52% of enterprises are very concerned or somewhat concerned that their attestation and access request processes won't fit with their cloud IAM solution

. 52% were very concerned or somewhat concerned that their infrastructure is not up to date to support cloud IAM protocols

. 48% of respondents were very concerned or somewhat concerned that their organization needs SSO to non-SAML or non-federated SaaS apps

. 38% were very concerned or somewhat concerned that their existing IAM infrastructure is incompatible with their cloud IAM solution

"This survey reveals that enterprises recognize the need for cloud identity and access management, but they're concerned about their ability to integrate these capabilities within existing infrastructures," said Brian Czarny, vice president of marketing for Symplified. "It's also clear that supporting non-SAML apps is a big challenge, and that organizations want the ability to choose between cloud-based and on-premises security options."

Symplified will host a free webinar presenting an in-depth analysis of the Forrester Consulting findings featuring Forrester Research, Inc., principal analyst Eve Maler. The webinar will take place on Thursday, Nov. 29 at 11am Mountain Time. To register, click here.

About Symplified | The Cloud Identity Company

Symplified provides seamless single sign-on, identity and access management services to help enterprises around the world safely and securely connect users to cloud, web and mobile applications. Symplified is headquartered in Boulder, Colorado and can be found on the Web at www.symplified.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2963
Published: 2014-07-10
Multiple cross-site scripting (XSS) vulnerabilities in group/control_panel/manage in Liferay Portal 6.1.2 CE GA3, 6.1.X EE, and 6.2.X EE allow remote attackers to inject arbitrary web script or HTML via the (1) _2_firstName, (2) _2_lastName, or (3) _2_middleName parameter.

CVE-2014-3310
Published: 2014-07-10
The File Transfer feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center does not verify that a requested file was an offered file, which allows remote attackers to read arbitrary files via a modified request, aka Bug IDs CSCup62442 and CSCup58463.

CVE-2014-3311
Published: 2014-07-10
Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center allows remote attackers to execute arbitrary code via crafted data, aka Bug IDs CSCup62463 and CSCup58467.

CVE-2014-3315
Published: 2014-07-10
Cross-site scripting (XSS) vulnerability in viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCup76308.

CVE-2014-3316
Published: 2014-07-10
The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.