Dell Survey Reveals a Context-Aware Security Approach Keeps the Business Secure and Employees More Productive

  • Findings show many of today’s traditional security policies result in too many passwords, access protocols and employee workarounds that expose the business to risk
  • 91 percent of business respondents say conventional security measures negatively impact their productivity
  • 97 percent of IT professionals see benefits in context-aware security practices, including improved worker productivity without sacrificing security

ROUND ROCK, Texas — (BUSINESS WIRE) — September 9, 2015Dell today announced the results of a global security survey uncovering how common access management processes limit employee productivity and often force employees to find workarounds that expose organizations to greater risk. In fact, 91 percent of business respondents reported that their productivity is negatively impacted by security measures their employer has put in place. However, if a business were to implement a context-aware security approach, replacing traditional, static access processes, 97 percent of IT professionals say they would see the benefits, including improved worker productivity without compromised security.

Context-aware security replaces static access processes with an approach that evaluates the context surrounding each access request, and adapts security requirements accordingly, delivering the level of security the business needs in real time based on an ever-changing threat landscape. While nearly 100 percent of IT professionals surveyed recognize the benefits a context-aware security approach would bring, only 28 percent said their organizations have fully embraced this approach. More than 60 percent indicated that lack of awareness about context-aware security is the greatest barrier to adopting it in their organization.

Additional notable survey findings:

  • More than 90 percent of business respondents use multiple passwords on a daily basis
  • 92 percent of business respondents are negatively impacted when required to use additional security for remote work
  • When looking at changes made to corporate security policies in the past 18 months, more than half of business respondents say security’s negative impact on day-to-day work has increased
  • Nearly 70 percent of IT professionals say employee workarounds to avoid IT-imposed security measures pose the greatest risk to the organization
  • 97 percent of IT professionals see the benefits in context-aware security, including:
    • The ability to prioritize threats based on context, including types of applications targeted
    • The ability to gain visibility into the context when assessing risk
    • The ability to address changing security needs in real-time and assess threats based on potential level of harm
    • The ability to improve worker productivity without sacrificing security
  • 93 percent of IT professionals said that a lack of context-aware security causes challenges that include:
    • Difficulty in quickly addressing changing security needs
    • Non-standard access needs that require IT intervention
    • Unnecessary impact on employee productivity
    • Inability to analyze how/why restrictions are managed to improve worker productivity

Organizations can successfully balance the right level of security and employee productivity with a context-aware security approach

Traditional security approaches address point-in-time risk with security implemented in silos. Separate passwords for everything – layered with multifactor authentication – plus separate security measures for remote workers, BYOD, and protection against outside threats result in poorly implemented security that obstructs productivity and exposes the business to risk from employee workarounds. Security doesn’t have to trump employee productivity. A context-aware approach alleviates mismanagement of access issues by focusing on the context of the access request to ensure access is appropriate in real-time. IT gains the ability to automate and “step-up” to multifactor authentication when the context dictates for an informed, priority-based decision specific to the situation. In addition, multiple passwords (or authentication actions) can be unified to present the user with a seamless access experience that maintains all the security that business and IT demand without negatively impacting employee productivity. Implementing a context-aware security approach helps businesses change security from a productivity barrier to a business enabler.

1 | 2  Next Page »
Featured Video
Jobs
Principal Engineer for Autodesk at San Francisco, California
Machine Learning Engineer 3D Geometry/ Multi-Modal for Autodesk at San Francisco, California
Senior Principal Software Engineer for Autodesk at San Francisco, California
Mechanical Manufacturing Engineering Manager for Google at Sunnyvale, California
Mechanical Engineer 2 for Lam Research at Fremont, California
Mechanical Test Engineer, Platforms Infrastructure for Google at Mountain View, California
Upcoming Events
Digital Twins 2024 at the Gaylord National Resort & Convention Center in, MD. National Harbor MD - Dec 9 - 11, 2024
Commercial UAV Expo 2025 at Amsterdam Netherlands - Apr 8 - 10, 2025
Commercial UAV Expo 2025 at RAI Amsterdam Amsterdam Netherlands - Apr 8 - 11, 2025
BI2025 - 13th Annual Building Innovation Conference at Ritz-Carlton Tysons Corner McLean VA - May 19 - 21, 2025



© 2024 Internet Business Systems, Inc.
670 Aberdeen Way, Milpitas, CA 95035
+1 (408) 882-6554 — Contact Us, or visit our other sites:
TechJobsCafe - Technical Jobs and Resumes EDACafe - Electronic Design Automation GISCafe - Geographical Information Services  MCADCafe - Mechanical Design and Engineering ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy PolicyAdvertise