Dell Survey Reveals a Context-Aware Security Approach Keeps the Business Secure and Employees More Productive

  • Findings show many of today’s traditional security policies result in too many passwords, access protocols and employee workarounds that expose the business to risk
  • 91 percent of business respondents say conventional security measures negatively impact their productivity
  • 97 percent of IT professionals see benefits in context-aware security practices, including improved worker productivity without sacrificing security

ROUND ROCK, Texas — (BUSINESS WIRE) — September 9, 2015Dell today announced the results of a global security survey uncovering how common access management processes limit employee productivity and often force employees to find workarounds that expose organizations to greater risk. In fact, 91 percent of business respondents reported that their productivity is negatively impacted by security measures their employer has put in place. However, if a business were to implement a context-aware security approach, replacing traditional, static access processes, 97 percent of IT professionals say they would see the benefits, including improved worker productivity without compromised security.

Context-aware security replaces static access processes with an approach that evaluates the context surrounding each access request, and adapts security requirements accordingly, delivering the level of security the business needs in real time based on an ever-changing threat landscape. While nearly 100 percent of IT professionals surveyed recognize the benefits a context-aware security approach would bring, only 28 percent said their organizations have fully embraced this approach. More than 60 percent indicated that lack of awareness about context-aware security is the greatest barrier to adopting it in their organization.

Additional notable survey findings:

  • More than 90 percent of business respondents use multiple passwords on a daily basis
  • 92 percent of business respondents are negatively impacted when required to use additional security for remote work
  • When looking at changes made to corporate security policies in the past 18 months, more than half of business respondents say security’s negative impact on day-to-day work has increased
  • Nearly 70 percent of IT professionals say employee workarounds to avoid IT-imposed security measures pose the greatest risk to the organization
  • 97 percent of IT professionals see the benefits in context-aware security, including:
    • The ability to prioritize threats based on context, including types of applications targeted
    • The ability to gain visibility into the context when assessing risk
    • The ability to address changing security needs in real-time and assess threats based on potential level of harm
    • The ability to improve worker productivity without sacrificing security
  • 93 percent of IT professionals said that a lack of context-aware security causes challenges that include:
    • Difficulty in quickly addressing changing security needs
    • Non-standard access needs that require IT intervention
    • Unnecessary impact on employee productivity
    • Inability to analyze how/why restrictions are managed to improve worker productivity

Organizations can successfully balance the right level of security and employee productivity with a context-aware security approach

Traditional security approaches address point-in-time risk with security implemented in silos. Separate passwords for everything – layered with multifactor authentication – plus separate security measures for remote workers, BYOD, and protection against outside threats result in poorly implemented security that obstructs productivity and exposes the business to risk from employee workarounds. Security doesn’t have to trump employee productivity. A context-aware approach alleviates mismanagement of access issues by focusing on the context of the access request to ensure access is appropriate in real-time. IT gains the ability to automate and “step-up” to multifactor authentication when the context dictates for an informed, priority-based decision specific to the situation. In addition, multiple passwords (or authentication actions) can be unified to present the user with a seamless access experience that maintains all the security that business and IT demand without negatively impacting employee productivity. Implementing a context-aware security approach helps businesses change security from a productivity barrier to a business enabler.

1 | 2  Next Page »
Featured Video
Jobs
Business Technology Analyst for Surface Water Management at Everett, Washington
GIS Specialist for Washington State Department of Natural Resources at Olympia, Washington
Business Development Manager for Berntsen International, Inc. at Madison, Wisconsin
Mechanical Manufacturing Engineering Manager for Google at Sunnyvale, California
Senior Principal Software Engineer for Autodesk at San Francisco, California
Manufacturing Test Engineer for Google at Prague, Czechia, Czech Republic
Upcoming Events
Dimensions User Conference 2024 at The Venetian Resort Las Vegas NV - Nov 11 - 13, 2024
URISA GIS Leadership Academy at Embassy Suites Fort Worth Downtown 600 Commerce Street Fort Worth, TX - Nov 18 - 22, 2024



© 2024 Internet Business Systems, Inc.
670 Aberdeen Way, Milpitas, CA 95035
+1 (408) 882-6554 — Contact Us, or visit our other sites:
AECCafe - Architectural Design and Engineering EDACafe - Electronic Design Automation TechJobsCafe - Technical Jobs and Resumes  MCADCafe - Mechanical Design and Engineering ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy PolicyAdvertise