Facebook with Latestnigeriannews  Twieet with latestnigeriannews  RSS Page Feed
Home  |  All Headlines  |  Punch  |  Thisday  |  Daily Sun  |  Vanguard   |  Guardian  |  The Nation  |  Daily Times  |  Daily Trust  |  Daily Independent
World  |  Sports  |  Technology  |  Entertainment  |  Business  |  Politics  |  Tribune  |  Leadership  |  National Mirror  |  BusinessDay  |  More Channels...

Viewing Mode:

Archive:

  1.     Tool Tips    
  2.    Collapsible   
  3.    Collapsed     
Click to view all Entertainment headlines today

Click to view all Sports headlines today

IT departments in SA still restrict users from accessing sensitive data

Published by Itnewsafrica on Thu, 05 Nov 2015


(Image Source: Koreatimes.com)Organizations are challenged to meet demands for greater mobility as 90% of IT departments in South Africa still restrict users from accessing sensitive corporate data and resources from mobile devices.This is according to a recent survey amongst South African IT decision makers by Gemalto (Euronext NL0000400653 GTO), the world leader in digital security. Despite all organizations (100%) having users who require mobile or remote access, 98% of IT departments in RSA are facing obstacles to increased user mobility in their organization, the primary being IT management overhead.The 2015 Global Authentication and Identity Access Management Index reveals that almost all South African respondents (90%) are concerned that their organization will be breached or hacked as a result of credential theft or compromise. This is exacerbated by the rise in mobile endpoints within organizations, as most organizations reported to have, on average, two mobile end points per user and managing three sets of credentials per user. Additionally, 27% of South African IT support tickets are resulting from lost or forgotten usernames and passwords.In an effort to overcome the security challenges around mobility, the majority of IT departments (84%) in RSA plan to implement two-factor authentication for access to cloud applications. Currently, 44% of users utilize two-factor authentication, this is expected to rise to over half (58%) of users using it in two years. 40% already use two-factor authentication to secure external users' access to resources, indicating the varied use of the technology. Almost all (90%) respondents currently have at least one application protected by two-factor authentication, with VPNs, local network access and cloud applications among the top three apps protected.As IT continues to look to two-factor authentication to deal with the credentials crunch, the vast majority (94%) of respondents are seeking to do this by using cloud-based authentication-as-a-service and managing their organization's two-factor authentication centrally. By having the ability to implement uniform policies that address security threats in a consistent way, two-factor authentication can at the same time streamline access to numerous applications. In addition, 18% of respondents' organizations in South Africa consider the total cost of ownership and the credibility and reputation of the vendor as the two most significant considerations for selecting a two-factor authentication solution.'The pressure is on for South African IT departments to accommodate demands for greater mobility as employees crave new and flexible approaches to working,' said Neil Cosser, Identity & Data Protection Manager for Africa at Gemalto. 'Organizations that are not open to this change are very likely to be inhibiting business productivity.'Users are likely to do what it takes to get the job done, with or without permission, so when corporate resources are scattered across different sites, the need for strong authentication and as-a-service delivery will serve vital functions in making this happen securely. In doing so, South African organizations will be better placed to protect the identities of their users, without sacrificing on productivity or data protection.''The growing use of cloud applications and mobile devices within organizations, combined with rising threats, and the need to reduce costs, require entirely new considerations for access control. Clearly there is an immediate need for authentication and access management solutions that can help South Africa organizations solve these challenges,' concluded Cosser.'Organizations recognize the need to scale security to protect as many on-premises and cloud applications as possible, especially when sourcing a two-factor authentication solution,' said Garrett Bekker, Senior Security Analyst at 451 Research. 'The survey findings suggest that the choice of two-factor authentication will depend on the solutions ability to provide centralized management, as well as secure access to the widest range of applications.'Some of the additional key findings of the survey include:Importance of Mobility Almost all (96%) respondents' organizations recognize it is important to offer mobility to employees in their work practices. The number of users utilizing tokens for mobility in respondents' organizations looks likely to increase across the boardon average, 44% of users in respondents' organizations are currently using them for mobility with this figure expected to increase to 58% on average, in two years' time.The purchasing decision When it comes to the final purchasing decision, the CIO (48%) is most likely to be the final decision maker when selecting a two-factor authentication solution. Both the total cost of ownership and the credibility and reputation of the vendor are, according to 18% of respondents, the two most significant considerations when deciding which two-factor authentication solution to selectSecurity threats and compliance Almost all (98%) respondents think that it is important that their organization has the ability to produce a single audit trail of access events taking place throughout different resources All 100% of respondents think that two-factor authentication can help their organization comply with data protection regulations and pass security auditsBackground information on the surveyThe research from Gemalto polled 900 IT decision makers in July 2015, across the US, UK, France, Germany, Australia, Japan, Benelux, Middle East, South Africa and Hong Kong. All respondents' organizations across a variety of sectors have at least 250 employees. Interviews were conducted by Vanson Bourne, an independent specialist in market research for the technology sector.Staff WriterRelated ArticlesEricsson set to deliver the connected kiosk to RwandaGemalto unveils findings of 2015 Breach Level IndexStudy reveals application economy demands new approach to securityA quarter of users don't understand the risks of Mobile Cyberthreats
Click here to read full news..

All Channels Nigerian Dailies: Punch  |  Vanguard   |  The Nation  |  Thisday  |  Daily Sun  |  Guardian  |  Daily Times  |  Daily Trust  |  Daily Independent  |   The Herald  |  Tribune  |  Leadership  |  National Mirror  |  BusinessDay  |  New Telegraph  |  Peoples Daily  |  Blueprint  |  Nigerian Pilot  |  Sahara Reporters  |  Premium Times  |  The Cable  |  PM News  |  APO Africa Newsroom

Categories Today: World  |  Sports  |  Technology  |  Entertainment  |  Business  |  Politics  |  Columns  |  All Headlines Today

Entertainment (Local): Linda Ikeji  |  Bella Naija  |  Tori  |  Pulse  |  The NET  |  DailyPost  |  Information Nigeria  |  Gistlover  |  Lailas Blog  |  Miss Petite  |  Olufamous  |  Stella Dimoko Korkus Blog  |  Ynaija  |  All Entertainment News Today

Entertainment (World): TMZ  |  Daily Mail  |  Huffington Post

Sports: Goal  |  African Football  |  Bleacher Report  |  FTBpro  |  Kickoff  |  All Sports Headlines Today

Business & Finance: Nairametrics  |  Nigerian Tenders  |  Business Insider  |  Forbes  |  Entrepreneur  |  The Economist  |  BusinessTech  |  Financial Watch  |  BusinessDay  |  All Business News Headlines Today

Technology (Local): Techpoint  |  TechMoran  |  TechCity  |  Innovation Village  |  IT News Africa  |  Technology Times  |  Technext  |  Techcabal  |  All Technology News Headlines Today

Technology (World): Techcrunch  |  Techmeme  |  Slashdot  |  Wired  |  Hackers News  |  Engadget  |  Pocket Lint  |  The Verge

International Networks:   |  CNN  |  BBC  |  Al Jazeera  |  Yahoo

Forum:   |  Nairaland  |  Naij

Other Links: Home   |  Nigerian Jobs