Global

Introduction

Gemalto's third annual Authentication and Identity Management Index revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) of the 1150 IT professionals surveyed globally, saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto's research suggests that personal applications (such as email) are the biggest worry to organisations.

Download the assets below for more information

Key Findings

  • The majority (90%) of respondents have concerns about employees in their organisation reusing personal credentials for work purposes
  • High profile breaches to consumer services is influencing the access management security policies of 89% of respondents’ organisations
  • Although most (60%) respondents’ organisations’ customers have provided mostly positive feedback on their organisation’s authentication policies, 12% have experienced mostly negative feedback
  • Nearly all (94%) protect at least one application with two-factor authentication
  • A high majority (96%) of respondents expect their organisation to expand their use of two-factor authentication in the future
  • 94% of respondents' organisations either do, or want to manage two-factor authentication centrally
  • Nearly four in ten (39%) respondents' organisations have implemented SSO in their organisation
  • Cloud-based deployment of cloud SSO is preferred by nearly six in ten (59%), with less than a quarter (23%) preferring an on-premises server
Australia

Introduction

Gemalto's third annual Authentication and Identity Management Index revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) of the 1150 IT professionals surveyed globally, saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto's research suggests that personal applications (such as email) are the biggest worry to organisations.

Key Findings

Benelux

Introduction

Gemalto's third annual Authentication and Identity Management Index revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) of the 1150 IT professionals surveyed globally, saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto's research suggests that personal applications (such as email) are the biggest worry to organisations.

Key Findings

Brazil

Introduction

Gemalto's third annual Authentication and Identity Management Index revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) of the 1150 IT professionals surveyed globally, saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto's research suggests that personal applications (such as email) are the biggest worry to organisations.

Key Findings

France

Introduction

Gemalto's third annual Authentication and Identity Management Index revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) of the 1150 IT professionals surveyed globally, saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto's research suggests that personal applications (such as email) are the biggest worry to organisations.

Key Findings

Germany

Introduction

Gemalto's third annual Authentication and Identity Management Index revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) of the 1150 IT professionals surveyed globally, saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto's research suggests that personal applications (such as email) are the biggest worry to organisations.

Key Findings

India

Introduction

Gemalto's third annual Authentication and Identity Management Index revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) of the 1150 IT professionals surveyed globally, saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto's research suggests that personal applications (such as email) are the biggest worry to organisations.

Key Findings

Japan

Introduction

Gemalto's third annual Authentication and Identity Management Index revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) of the 1150 IT professionals surveyed globally, saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto's research suggests that personal applications (such as email) are the biggest worry to organisations.

Key Findings

Middle East

Introduction

Gemalto's third annual Authentication and Identity Management Index revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) of the 1150 IT professionals surveyed globally, saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto's research suggests that personal applications (such as email) are the biggest worry to organisations.

Key Findings

Russia

Introduction

Gemalto's third annual Authentication and Identity Management Index revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) of the 1150 IT professionals surveyed globally, saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto's research suggests that personal applications (such as email) are the biggest worry to organisations.

Key Findings

South Africa

Introduction

Gemalto's third annual Authentication and Identity Management Index revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) of the 1150 IT professionals surveyed globally, saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto's research suggests that personal applications (such as email) are the biggest worry to organisations.

Key Findings

UK

Introduction

Gemalto's third annual Authentication and Identity Management Index revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) of the 1150 IT professionals surveyed globally, saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto's research suggests that personal applications (such as email) are the biggest worry to organisations.

Key Findings

US

Introduction

Gemalto's third annual Authentication and Identity Management Index revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) of the 1150 IT professionals surveyed globally, saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto's research suggests that personal applications (such as email) are the biggest worry to organisations.

Key Findings

Global

External influences on authentication practices

more
Global

Two-factor authentication

more
Global

Cloud access management (including SSO)

more
Global

External users and mobility

more
Global

Decision-making process for authentication

more
Global

Conclusion

From credential sharing to authentication practices, it's clear that consumer trends are having a big impact on enterprise security. But businesses need to make sure their data isn't compromised by bad personal habits. It's encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management, as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it's important that they keep pushing for security to be a priority at the board level, and ensure that it's front of mind for everyone in an organisation.

Australia

Conclusion

From credential sharing to authentication practices, it's clear that consumer trends are having a big impact on enterprise security. But businesses need to make sure their data isn't compromised by bad personal habits. It's encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management, as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it's important that they keep pushing for security to be a priority at the board level, and ensure that it's front of mind for everyone in an organisation.

Benelux

Conclusion

From credential sharing to authentication practices, it's clear that consumer trends are having a big impact on enterprise security. But businesses need to make sure their data isn't compromised by bad personal habits. It's encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management, as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it's important that they keep pushing for security to be a priority at the board level, and ensure that it's front of mind for everyone in an organisation.

Brazil

Conclusion

From credential sharing to authentication practices, it's clear that consumer trends are having a big impact on enterprise security. But businesses need to make sure their data isn't compromised by bad personal habits. It's encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management, as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it's important that they keep pushing for security to be a priority at the board level, and ensure that it's front of mind for everyone in an organisation.

France

Conclusion

From credential sharing to authentication practices, it's clear that consumer trends are having a big impact on enterprise security. But businesses need to make sure their data isn't compromised by bad personal habits. It's encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management, as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it's important that they keep pushing for security to be a priority at the board level, and ensure that it's front of mind for everyone in an organisation.

Germany

Conclusion

From credential sharing to authentication practices, it's clear that consumer trends are having a big impact on enterprise security. But businesses need to make sure their data isn't compromised by bad personal habits. It's encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management, as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it's important that they keep pushing for security to be a priority at the board level, and ensure that it's front of mind for everyone in an organisation.

India

Conclusion

From credential sharing to authentication practices, it's clear that consumer trends are having a big impact on enterprise security. But businesses need to make sure their data isn't compromised by bad personal habits. It's encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management, as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it's important that they keep pushing for security to be a priority at the board level, and ensure that it's front of mind for everyone in an organisation.

Japan

Conclusion

From credential sharing to authentication practices, it's clear that consumer trends are having a big impact on enterprise security. But businesses need to make sure their data isn't compromised by bad personal habits. It's encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management, as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it's important that they keep pushing for security to be a priority at the board level, and ensure that it's front of mind for everyone in an organisation.

Middle East

Conclusion

From credential sharing to authentication practices, it's clear that consumer trends are having a big impact on enterprise security. But businesses need to make sure their data isn't compromised by bad personal habits. It's encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management, as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it's important that they keep pushing for security to be a priority at the board level, and ensure that it's front of mind for everyone in an organisation.

Russia

Conclusion

From credential sharing to authentication practices, it's clear that consumer trends are having a big impact on enterprise security. But businesses need to make sure their data isn't compromised by bad personal habits. It's encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management, as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it's important that they keep pushing for security to be a priority at the board level, and ensure that it's front of mind for everyone in an organisation.

South Africa

Conclusion

From credential sharing to authentication practices, it's clear that consumer trends are having a big impact on enterprise security. But businesses need to make sure their data isn't compromised by bad personal habits. It's encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management, as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it's important that they keep pushing for security to be a priority at the board level, and ensure that it's front of mind for everyone in an organisation.

UK

Conclusion

From credential sharing to authentication practices, it's clear that consumer trends are having a big impact on enterprise security. But businesses need to make sure their data isn't compromised by bad personal habits. It's encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management, as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it's important that they keep pushing for security to be a priority at the board level, and ensure that it's front of mind for everyone in an organisation.

US

Conclusion

From credential sharing to authentication practices, it's clear that consumer trends are having a big impact on enterprise security. But businesses need to make sure their data isn't compromised by bad personal habits. It's encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management, as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it's important that they keep pushing for security to be a priority at the board level, and ensure that it's front of mind for everyone in an organisation.

Demographics

The research from Gemalto polled 1150 IT decision makers in September 2016, across the US (200), UK (100), France (100), Germany (100), Australia (100), Japan (100), India (100), Russia (100), Brazil (100), Benelux (50), Middle East (50) and South Africa (50). All respondents’ organizations across a variety of sectors have at least 250 employees. Interviews were conducted by Vanson Bourne, an independent specialist in market research for the technology sector.

Respondents

ISV respondants
  • US - 17.3% (200)
  • UK - 8.6% (100)
  • France - 8.6% (100)
  • Germany - 8.6% (100)
  • Australia - 8.6% (100)
  • Russia - 8.6% (100)
  • Japan - 8.6% (100)
  • India - 8.6% (100)
  • Brazil - 8.6% (100)
  • Benelux - 4.3% (50)
  • Middle East - 4.3% (50)
  • South Africa - 4.3% (50)