Global

Introduction

Organizations are failing to meet demands for greater mobility as 92% of IT departments worldwide still restrict users from accessing corporate resources from mobile devices, according to a recent global survey of 900 IT decision makers by Gemalto. Despite almost all organizations 98% having users who require mobile or remote access, 95% of IT departments admit that there are obstacles to increased user mobility in their organization, the primary being security concerns.

Download the infographic to get more information

Challenges of secure mobile access Download

Key Findings

  • Almost all respondents (94%) are concerned that their organization will be breached or hacked as a result of theft of confidential data or compromise. Exacerbated by the rise in mobile endpoints within organizations, respondents have, on average, two mobile end points per user within organizations.
  • Matched against the number of employees within a company, the survey found that for an organization with more than 5,000 employees, there exists on average more than 8,500 mobile end points. The concern around theft is likely to grow and further inhibit mobility across organizations, particularly as respondents are managing an average of three sets of credentials per user.
  • The vast majority (95%) of respondents believe that two-factor authentication can help their organization comply with data protection regulations and pass security audits.
Australia

Introduction

Organizations are failing to meet demands for greater mobility as 93% of IT departments in Australia still restrict users from accessing corporate resources from mobile devices, according to a recent global survey of 900 IT decision makers by Gemalto. Despite all organizations (100%) having users who require mobile or remote access, 96% of IT departments admit that there are obstacles to increased user mobility in their organization, the primary being security concerns.

Download the infographic to get more information

Challenges of secure mobile access Download

Key Findings

  • Almost all respondents (96%) are concerned that their organization will be breached or hacked as a result of theft of confidential data or compromise. Exacerbated by the rise in mobile endpoints within organizations, respondents have, on average, two mobile end points per user within organizations.
  • The concern around theft is likely to grow and further inhibit mobility across organizations, particularly as respondents are managing an average of three sets of credentials per user.
  • The vast majority (94%) of respondents believe that two-factor authentication can help their organization comply with data protection regulations and pass security audits.
Benelux

Introduction

Organizations are failing to meet demands for greater mobility as 96% of IT departments in Benelux still restrict users from accessing corporate resources from mobile devices, according to a recent global survey of 900 IT decision makers by Gemalto. Despite all organizations (100%) having users who require mobile or remote access, 90% of IT departments admit that there are obstacles to increased user mobility in their organization, the primary being compliance – restrictive mandates.

Download the infographic to get more information

Challenges of secure mobile access Download

Key Findings

  • All respondents (100%) are concerned that their organization will be breached or hacked as a result of theft of confidential data or compromise. Exacerbated by the rise in mobile endpoints within organizations, respondents have, on average, three mobile end points per user within organizations.
  • The concern around theft is likely to grow and further inhibit mobility across organizations, particularly as respondents are managing an average of three sets of credentials per user.
  • The vast majority (94%) of respondents believe that two-factor authentication can help their organization comply with data protection regulations and pass security audits.
France

Introduction

Organizations are failing to meet demands for greater mobility as 89% of IT departments in France still restrict users from accessing corporate resources from mobile devices, according to a recent global survey of 900 IT decision makers by Gemalto. Despite all organizations (100%) having users who require mobile or remote access, 93% of IT departments admit that there are obstacles to increased user mobility in their organization, the primary being security concerns.

Download the infographic to get more information

Challenges of secure mobile access Download

Key Findings

  • Over nine in ten respondents (92%) are concerned that their organization will be breached or hacked as a result of theft of confidential data or compromise. Exacerbated by the rise in mobile endpoints within organizations, respondents have, on average, three mobile end points per user within organizations.
  • The concern around theft is likely to grow and further inhibit mobility across organizations, particularly as respondents are managing an average of three sets of credentials per user.
  • The vast majority (95%) of respondents believe that two-factor authentication can help their organization comply with data protection regulations and pass security audits.
Germany

Introduction

Organizations are failing to meet demands for greater mobility as 92% of IT departments in Germany still restrict users from accessing corporate resources from mobile devices, according to a recent global survey of 900 IT decision makers by Gemalto. Despite almost all organizations (97%) having users who require mobile or remote access, 95% of IT departments admit that there are obstacles to increased user mobility in their organization, the primary being security concerns.

Download the infographic to get more information

Challenges of secure mobile access Download

Key Findings

  • Over nine in ten respondents (94%) are concerned that their organization will be breached or hacked as a result of theft of confidential data or compromise. Exacerbated by the rise in mobile endpoints within organizations, respondents have, on average, two mobile end points per user within organizations.
  • The concern around theft is likely to grow and further inhibit mobility across organizations, particularly as respondents are managing an average of three sets of credentials per user.
  • The vast majority (95%) of respondents believe that two-factor authentication can help their organization comply with data protection regulations and pass security audits.
Hong Kong

Introduction

Organizations are failing to meet demands for greater mobility as 90% of IT departments in Hong Kong still restrict users from accessing corporate resources from mobile devices, according to a recent global survey of 900 IT decision makers by Gemalto. Despite all organizations (100%) having users who require mobile or remote access, 100% of IT departments admit that there are obstacles to increased user mobility in their organization, the primary being IT management overhead.

Download the infographic to get more information

Challenges of secure mobile access Download

Key Findings

  • All respondents (100%) are concerned that their organization will be breached or hacked as a result of theft of confidential data or compromise. Exacerbated by the rise in mobile endpoints within organizations, respondents have, on average, two mobile end points per user within organizations.
  • The concern around theft is likely to grow and further inhibit mobility across organizations, particularly as respondents are managing an average of three sets of credentials per user.
  • Nine in ten (90%) respondents believe that two-factor authentication can help their organization comply with data protection regulations and pass security audits.
Japan

Introduction

Organizations are failing to meet demands for greater mobility as 87% of IT departments in Japan still restrict users from accessing corporate resources from mobile devices, according to a recent global survey of 900 IT decision makers by Gemalto. Despite the majority of organizations (87%) having users who require mobile or remote access, 89% of IT departments admit that there are obstacles to increased user mobility in their organization, the primary being IT management overhead.

Download the infographic to get more information

Challenges of secure mobile access Download

Key Findings

  • Over nine in ten respondents (91%) are concerned that their organization will be breached or hacked as a result of theft of confidential data or compromise. Exacerbated by the rise in mobile endpoints within organizations, respondents have, on average, two mobile end points per user within organizations.
  • The concern around theft is likely to grow and further inhibit mobility across organizations, particularly as respondents are managing an average of two sets of credentials per user.
  • The vast majority (86%) of respondents believe that two-factor authentication can help their organization comply with data protection regulations and pass security audits.
Middle East

Introduction

Organizations are failing to meet demands for greater mobility as 98% of IT departments in the Middle East still restrict users from accessing corporate resources from mobile devices, according to a recent global survey of 900 IT decision makers by Gemalto. Despite almost all organizations (98%) having users who require mobile or remote access, 100% of IT departments admit that there are obstacles to increased user mobility in their organization, the primary being compliance – restrictive mandates.

Download the infographic to get more information

Challenges of secure mobile access Download

Key Findings

  • All respondents (100%) are concerned that their organization will be breached or hacked as a result of theft of confidential data or compromise. Exacerbated by the rise in mobile endpoints within organizations, respondents have, on average, three mobile end points per user within organizations.
  • The concern around theft is likely to grow and further inhibit mobility across organizations, particularly as respondents are managing an average of three sets of credentials per user.
  • Almost all (98%) respondents believe that two-factor authentication can help their organization comply with data protection regulations and pass security audits.
South Africa

Introduction

Organizations are failing to meet demands for greater mobility as 90% of IT departments in South Africa still restrict users from accessing corporate resources from mobile devices, according to a recent global survey of 900 IT decision makers by Gemalto. Despite all organizations (100%) having users who require mobile or remote access, 98% of IT departments admit that there are obstacles to increased user mobility in their organization, the primary being IT management overhead.

Download the infographic to get more information

Challenges of secure mobile access Download

Key Findings

  • Nine in ten respondents (90%) are concerned that their organization will be breached or hacked as a result of theft of confidential data or compromise. Exacerbated by the rise in mobile endpoints within organizations, respondents have, on average, two mobile end points per user within organizations.
  • The concern around theft is likely to grow and further inhibit mobility across organizations, particularly as respondents are managing an average of three sets of credentials per user.
  • All (100%) respondents believe that two-factor authentication can help their organization comply with data protection regulations and pass security audits.
UK

Introduction

Organizations are failing to meet demands for greater mobility as 94% of IT departments in the UK still restrict users from accessing corporate resources from mobile devices, according to a recent global survey of 900 IT decision makers by Gemalto. Despite all organizations (100%) having users who require mobile or remote access, 94% of IT departments admit that there are obstacles to increased user mobility in their organization, the primary being security concerns.

Download the infographic to get more information

Challenges of secure mobile access Download

Key Findings

  • Around nine in ten respondents (91%) are concerned that their organization will be breached or hacked as a result of theft of confidential data or compromise. Exacerbated by the rise in mobile endpoints within organizations, respondents have, on average, two mobile end points per user within organizations.
  • The concern around theft is likely to grow and further inhibit mobility across organizations, particularly as respondents are managing an average of three sets of credentials per user.
  • Almost all (98%) respondents believe that two-factor authentication can help their organization comply with data protection regulations and pass security audits.
US

Introduction

Organizations are failing to meet demands for greater mobility as 92% of IT departments in the US still restrict users from accessing corporate resources from mobile devices, according to a recent global survey of 900 IT decision makers by Gemalto. Despite almost all organizations (98%) having users who require mobile or remote access, 95% of IT departments admit that there are obstacles to increased user mobility in their organization, the primary being security concerns.

Download the infographic to get more information

Challenges of secure mobile access Download

Key Findings

  • The vast majority of respondents (95%) are concerned that their organization will be breached or hacked as a result of theft of confidential data or compromise. Exacerbated by the rise in mobile endpoints within organizations, respondents have, on average, three mobile end points per user within organizations.
  • The concern around theft is likely to grow and further inhibit mobility across organizations, particularly as respondents are managing an average of three sets of credentials per user.
  • The vast majority (98%) of respondents believe that two-factor authentication can help their organization comply with data protection regulations and pass security audits.
Global

Applications

Data indicates that IT professionals realize that the key to providing uniform protection for numerous applications lies in the ability to centrally implement two factor for both cloud and on-premises applications.

more
Global

External Users and Mobile Devices

Concern about access security from mobile devices is clearly constraining organizations’ ability to better utilize mobile computing platforms for broader business applications.

more
Global

Mobility

Findings show that Strong Authentication is considered to be a key factor in implementing secure employee mobility programs in many organizations.

more
Global

Security Threats

Fear of a security breach and credential creep are leading IT professionals to find better more efficient ways of implementing two – factor authentication in their organizations.

more
Global

Decision Making Process

Decision making criteria for assessing and purchasing a strong authentication solution have clearly changed considerably over the past few years. Findings show that cloud efficiencies, central management, frictionless authentication methods and the ability to centrally manage access are key factors that are IT professionals take into account.

more
Global

Conclusion

The appetite for two-factor authentication is growing fast with more than nine in ten expecting that their organization’s use of this technology will expand in the future to alleviate security concerns.

The pressure is on for IT departments to accommodate demands for greater mobility as employees crave new and flexible approaches to working and organizations that are not open to this change are very likely to be inhibiting business productivity. Users are likely to do what it takes to get their job done, with or without permission, so when corporate resources are scattered across different sites, the need for strong authentication will serve a vital function in making this happen securely. In doing so, organizations will be better placed to protect the identities of their users, without sacrificing on productivity or data protection.

Australia

Conclusion

The appetite for two-factor authentication is growing fast with more than nine in ten (98%) expecting that their organization’s use of this technology will expand in the future to alleviate security concerns.

The pressure is on for IT departments to accommodate demands for greater mobility as employees crave new and flexible approaches to working and organizations that are not open to this change are very likely to be inhibiting business productivity. Users are likely to do what it takes to get their job done, with or without permission, so when corporate resources are scattered across different sites, the need for strong authentication will serve a vital function in making this happen securely. In doing so, organizations will be better placed to protect the identities of their users, without sacrificing on productivity or data protection.

Benelux

Conclusion

The appetite for two-factor authentication is growing fast with more than nine in ten (92%) expecting that their organization’s use of this technology will expand in the future to alleviate security concerns.

The pressure is on for IT departments to accommodate demands for greater mobility as employees crave new and flexible approaches to working and organizations that are not open to this change are very likely to be inhibiting business productivity. Users are likely to do what it takes to get their job done, with or without permission, so when corporate resources are scattered across different sites, the need for strong authentication will serve a vital function in making this happen securely. In doing so, organizations will be better placed to protect the identities of their users, without sacrificing on productivity or data protection.

France

Conclusion

The appetite for two-factor authentication is growing fast with more than nine in ten (96%) expecting that their organization’s use of this technology will expand in the future to alleviate security concerns.

The pressure is on for IT departments to accommodate demands for greater mobility as employees crave new and flexible approaches to working and organizations that are not open to this change are very likely to be inhibiting business productivity. Users are likely to do what it takes to get their job done, with or without permission, so when corporate resources are scattered across different sites, the need for strong authentication will serve a vital function in making this happen securely. In doing so, organizations will be better placed to protect the identities of their users, without sacrificing on productivity or data protection.

Germany

Conclusion

The appetite for two-factor authentication is growing fast with almost all (97%) expecting that their organization’s use of this technology will expand in the future to alleviate security concerns.

The pressure is on for IT departments to accommodate demands for greater mobility as employees crave new and flexible approaches to working and organizations that are not open to this change are very likely to be inhibiting business productivity. Users are likely to do what it takes to get their job done, with or without permission, so when corporate resources are scattered across different sites, the need for strong authentication will serve a vital function in making this happen securely. In doing so, organizations will be better placed to protect the identities of their users, without sacrificing on productivity or data protection.

Hong Kong

Conclusion

The appetite for two-factor authentication is growing fast with more than nine in ten (94%) expecting that their organization’s use of this technology will expand in the future to alleviate security concerns.

The pressure is on for IT departments to accommodate demands for greater mobility as employees crave new and flexible approaches to working and organizations that are not open to this change are very likely to be inhibiting business productivity. Users are likely to do what it takes to get their job done, with or without permission, so when corporate resources are scattered across different sites, the need for strong authentication will serve a vital function in making this happen securely. In doing so, organizations will be better placed to protect the identities of their users, without sacrificing on productivity or data protection.

Japan

Conclusion

The appetite for two-factor authentication is growing fast with more than eight in ten (82%) expecting that their organization’s use of this technology will expand in the future to alleviate security concerns.

The pressure is on for IT departments to accommodate demands for greater mobility as employees crave new and flexible approaches to working and organizations that are not open to this change are very likely to be inhibiting business productivity. Users are likely to do what it takes to get their job done, with or without permission, so when corporate resources are scattered across different sites, the need for strong authentication will serve a vital function in making this happen securely. In doing so, organizations will be better placed to protect the identities of their users, without sacrificing on productivity or data protection.

Middle East

Conclusion

The appetite for two-factor authentication is growing fast with more than nine in ten (98%) expecting that their organization’s use of this technology will expand in the future to alleviate security concerns.

The pressure is on for IT departments to accommodate demands for greater mobility as employees crave new and flexible approaches to working and organizations that are not open to this change are very likely to be inhibiting business productivity. Users are likely to do what it takes to get their job done, with or without permission, so when corporate resources are scattered across different sites, the need for strong authentication will serve a vital function in making this happen securely. In doing so, organizations will be better placed to protect the identities of their users, without sacrificing on productivity or data protection.

South Africa

Conclusion

The appetite for two-factor authentication is growing fast with more than nine in ten (98%) expecting that their organization’s use of this technology will expand in the future to alleviate security concerns.

The pressure is on for IT departments to accommodate demands for greater mobility as employees crave new and flexible approaches to working and organizations that are not open to this change are very likely to be inhibiting business productivity. Users are likely to do what it takes to get their job done, with or without permission, so when corporate resources are scattered across different sites, the need for strong authentication will serve a vital function in making this happen securely. In doing so, organizations will be better placed to protect the identities of their users, without sacrificing on productivity or data protection.

UK

Conclusion

The appetite for two-factor authentication is growing fast with more than eight in ten (84%) expecting that their organization’s use of this technology will expand in the future to alleviate security concerns.

The pressure is on for IT departments to accommodate demands for greater mobility as employees crave new and flexible approaches to working and organizations that are not open to this change are very likely to be inhibiting business productivity. Users are likely to do what it takes to get their job done, with or without permission, so when corporate resources are scattered across different sites, the need for strong authentication will serve a vital function in making this happen securely. In doing so, organizations will be better placed to protect the identities of their users, without sacrificing on productivity or data protection.

US

Conclusion

The appetite for two-factor authentication is growing fast with more than nine in ten (96%) expecting that their organization’s use of this technology will expand in the future to alleviate security concerns.

The pressure is on for IT departments to accommodate demands for greater mobility as employees crave new and flexible approaches to working and organizations that are not open to this change are very likely to be inhibiting business productivity. Users are likely to do what it takes to get their job done, with or without permission, so when corporate resources are scattered across different sites, the need for strong authentication will serve a vital function in making this happen securely. In doing so, organizations will be better placed to protect the identities of their users, without sacrificing on productivity or data protection.

  • While mobility is recognized as being very important, 46% of respondents cited security concerns and 46% cited manageability challenges as hampering their organizations’ ability to implement mobility programs
  • The need for strong authentication appears to be growing: Respondents expect 51.4% of users in their organizations will be using two factor authentication within 2 years
  • The need to protect more complex IT environments has led to a desire for better manageability and scalability: 56% of respondents cited the ability to protect as many enterprise and cloud applications as possible as a key criteria when assessing a strong authentication solution
  • Cloud efficiencies play a role in decision making with 52% of respondents citing cloud-based delivery as a main considerations when sourcing an authentication solution
  • Ease of use is at the top of IT professionals minds with 94% citing software and frictionless authentication methods as a key consideration when assessing strong authentication solutions

Demographics

The research from Gemalto polled 900 IT decision makers in July 2015, across the US (200), UK (100), France (100), Germany (100), Australia (100), Japan (100), Benelux (50), Middle East (50), South Africa (50) and Hong Kong (50). All respondents’ organizations across a variety of sectors have at least 250 employees. Interviews were conducted by Vanson Bourne, an independent specialist in market research for the technology sector.

Respondants

ISV respondants
  • US - 22.2%(200)
  • UK - 11.1%(100)
  • France - 11.1%(100)
  • Germany - 11.1%(100)
  • Australia - 11.1%(100)
  • Japan - 11.1%(100)
  • Benelux - 5.55%(50)
  • Middle East - 5.55%(50)
  • South Africa - 5.55%(50)
  • Hong Kong - 5.55%(50)