Dell Survey Reveals a Context-Aware Security Approach Keeps the Business Secure and Employees More Productive

  • Findings show many of today’s traditional security policies result in too many passwords, access protocols and employee workarounds that expose the business to risk
  • 91 percent of business respondents say conventional security measures negatively impact their productivity
  • 97 percent of IT professionals see benefits in context-aware security practices, including improved worker productivity without sacrificing security

ROUND ROCK, Texas — (BUSINESS WIRE) — September 9, 2015Dell today announced the results of a global security survey uncovering how common access management processes limit employee productivity and often force employees to find workarounds that expose organizations to greater risk. In fact, 91 percent of business respondents reported that their productivity is negatively impacted by security measures their employer has put in place. However, if a business were to implement a context-aware security approach, replacing traditional, static access processes, 97 percent of IT professionals say they would see the benefits, including improved worker productivity without compromised security.

Context-aware security replaces static access processes with an approach that evaluates the context surrounding each access request, and adapts security requirements accordingly, delivering the level of security the business needs in real time based on an ever-changing threat landscape. While nearly 100 percent of IT professionals surveyed recognize the benefits a context-aware security approach would bring, only 28 percent said their organizations have fully embraced this approach. More than 60 percent indicated that lack of awareness about context-aware security is the greatest barrier to adopting it in their organization.

Additional notable survey findings:

  • More than 90 percent of business respondents use multiple passwords on a daily basis
  • 92 percent of business respondents are negatively impacted when required to use additional security for remote work
  • When looking at changes made to corporate security policies in the past 18 months, more than half of business respondents say security’s negative impact on day-to-day work has increased
  • Nearly 70 percent of IT professionals say employee workarounds to avoid IT-imposed security measures pose the greatest risk to the organization
  • 97 percent of IT professionals see the benefits in context-aware security, including:
    • The ability to prioritize threats based on context, including types of applications targeted
    • The ability to gain visibility into the context when assessing risk
    • The ability to address changing security needs in real-time and assess threats based on potential level of harm
    • The ability to improve worker productivity without sacrificing security
  • 93 percent of IT professionals said that a lack of context-aware security causes challenges that include:
    • Difficulty in quickly addressing changing security needs
    • Non-standard access needs that require IT intervention
    • Unnecessary impact on employee productivity
    • Inability to analyze how/why restrictions are managed to improve worker productivity

Organizations can successfully balance the right level of security and employee productivity with a context-aware security approach

Traditional security approaches address point-in-time risk with security implemented in silos. Separate passwords for everything – layered with multifactor authentication – plus separate security measures for remote workers, BYOD, and protection against outside threats result in poorly implemented security that obstructs productivity and exposes the business to risk from employee workarounds. Security doesn’t have to trump employee productivity. A context-aware approach alleviates mismanagement of access issues by focusing on the context of the access request to ensure access is appropriate in real-time. IT gains the ability to automate and “step-up” to multifactor authentication when the context dictates for an informed, priority-based decision specific to the situation. In addition, multiple passwords (or authentication actions) can be unified to present the user with a seamless access experience that maintains all the security that business and IT demand without negatively impacting employee productivity. Implementing a context-aware security approach helps businesses change security from a productivity barrier to a business enabler.

1 | 2  Next Page »
Featured Video
Editorial
Jobs
Senior Principal Mechanical Engineer for General Dynamics Mission Systems at Canonsburg, Pennsylvania
Equipment Engineer, Raxium for Google at Fremont, California
Mechanical Engineer 2 for Lam Research at Fremont, California
Manufacturing Test Engineer for Google at Prague, Czechia, Czech Republic
Mechanical Test Engineer, Platforms Infrastructure for Google at Mountain View, California
Mechanical Manufacturing Engineering Manager for Google at Sunnyvale, California
Upcoming Events
Celebrate Manufacturing Excellence at Anaheim Convention Center Anaheim CA - Feb 4 - 6, 2025
3DEXPERIENCE World 2025 at George R. Brown Convention Center Houston TX - Feb 23 - 26, 2025
TIMTOS 2025 at Nangang Exhibition Center Hall 1 & 2 (TaiNEX 1 & 2) TWTC Hall Taipei Taiwan - Mar 3 - 8, 2025
Additive Manufacturing Forum 2025 at Estrel Convention Cente Berlin Germany - Mar 17 - 18, 2025



© 2024 Internet Business Systems, Inc.
670 Aberdeen Way, Milpitas, CA 95035
+1 (408) 882-6554 — Contact Us, or visit our other sites:
AECCafe - Architectural Design and Engineering EDACafe - Electronic Design Automation GISCafe - Geographical Information Services TechJobsCafe - Technical Jobs and Resumes ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy PolicyAdvertise