Analytics
11/14/2012
08:10 PM
Don Bailey
Don Bailey
Products and Releases
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Forrester Survey: Wary Enterprises Still Place Sensitive Data In The Cloud

User provisioning and SSO/Web access management the two leading access-control priorities for enterprises

BOULDER, Colo., Nov. 14, 2012 - Symplified, the Cloud Identity Company, today released new research that shows one third of enterprises place highly sensitive data in the public cloud even though most are wary of the implications on security and other business processes. The findings -- from an independent August 2012 commissioned study conducted by Forrester Consulting on behalf of Symplified -- of US enterprise IT security managers, also found that nearly half of respondents do not think their existing identity and access management (IAM) infrastructures will be able to support cloud applications and provide single sign-on (SSO).

According to the study entitled "Access Management for the Extended Enterprise: A Timely Challenge," while most enterprises are concerned about exposing data to the cloud, nearly a third of them already place highly sensitive data like regulated financial (34%) and healthcare information (29%) in SaaS apps. As for their preferred method for consuming cloud security, the top two choices - embedded in the cloud service (23%) and third-party on-premise solution (20%) - were evenly split.

"The data collected shows that IT managers are living with a gap between cloud usage and corresponding cloud security. As solutions for managing cloud access mature, we anticipate IT departments will feel corresponding pressure to improve the fundamental processes of identity management and access management within their own organizations," said the study. "They must increasingly support business owners in a drive to take advantage of cloud-enabled and mobile-enabled business partnerships - and their ability to execute will be significantly affected by the ability of their IAM systems to adapt."

Key Survey Findings

Forrester Consulting identified the following key IAM trends:

. User Provisioning (61%) and SSO/Web Access Management (53%) are the two leading access control priorities for enterprises

. 52% of enterprises are very concerned or somewhat concerned that their attestation and access request processes won't fit with their cloud IAM solution

. 52% were very concerned or somewhat concerned that their infrastructure is not up to date to support cloud IAM protocols

. 48% of respondents were very concerned or somewhat concerned that their organization needs SSO to non-SAML or non-federated SaaS apps

. 38% were very concerned or somewhat concerned that their existing IAM infrastructure is incompatible with their cloud IAM solution

"This survey reveals that enterprises recognize the need for cloud identity and access management, but they're concerned about their ability to integrate these capabilities within existing infrastructures," said Brian Czarny, vice president of marketing for Symplified. "It's also clear that supporting non-SAML apps is a big challenge, and that organizations want the ability to choose between cloud-based and on-premises security options."

Symplified will host a free webinar presenting an in-depth analysis of the Forrester Consulting findings featuring Forrester Research, Inc., principal analyst Eve Maler. The webinar will take place on Thursday, Nov. 29 at 11am Mountain Time. To register, click here.

About Symplified | The Cloud Identity Company

Symplified provides seamless single sign-on, identity and access management services to help enterprises around the world safely and securely connect users to cloud, web and mobile applications. Symplified is headquartered in Boulder, Colorado and can be found on the Web at www.symplified.com. Don A. Bailey is a pioneer in security for mobile technology, the Internet of Things, and embedded systems. He has a long history of ground-breaking research, protecting mobile users from worldwide tracking systems, securing automobiles from remote attack, and mitigating ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7178
Published: 2014-11-28
Enalean Tuleap before 7.5.99.6 allows remote attackers to execute arbitrary commands via the User-Agent header, which is provided to the passthru PHP function.

CVE-2014-7850
Published: 2014-11-28
Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation.

CVE-2014-8423
Published: 2014-11-28
Unspecified vulnerability in the management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to execute arbitrary commands via unknown vectors.

CVE-2014-8424
Published: 2014-11-28
ARRIS VAP2500 before FW08.41 does not properly validate passwords, which allows remote attackers to bypass authentication.

CVE-2014-8425
Published: 2014-11-28
The management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to obtain credentials by reading the configuration files.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?