Bring your own identity

September 2014 Access Control & Identity Management

New research shows that both the lines of business and IT departments see value in ‘Bring Your Own Identity’ (BYOID) initiatives, where social networking or digital IDs are used for application login. The groups also agree that more security is needed to increase BYOID adoption.

The report, ‘The Identity Imperative for the Open Enterprise 2014’, conducted by the Ponemon Institute and CA Technologies, examines business user and IT department attitudes toward BYOID.

Ugan Naidoo, head of security at CA Southern Africa.
Ugan Naidoo, head of security at CA Southern Africa.

“In today’s application-driven economy, access to applications has to be simple and secure. BYOID is an increasingly popular option for simplifying access. It can reduce the need to create new accounts for every site, which leads to registration fatigue and abandoned shopping carts,” says Ugan Naidoo, head of security at CA Southern Africa. “We are working to make sure we enhance BYOID security without adding friction or complexity.”

The report provided several key insights into BYOID, including the current state of adoption, its perceived value and views toward the identity providers and how BYOID could be enhanced.

Current state

BYOID deployment using social IDs is still in its infancy, but interest is high, especially for mobile and Web customer populations. There is a high level of interest in BYOID and using social identities such as Facebook, LinkedIn or Yahoo, with 50% of IT and 63% of business users expressing high or very high interest. Customers engaging with the business via the Web and mobile device were highest rated for targeted digital identity engagement, eclipsing other populations such as job recruits, employees, contractors and retirees.

Perceived value

Identity is now viewed as a contributing growth asset as well as a security component. Both IT and business users agreed that an important reason for BYOID adoption in their organisation was to achieve a stronger identity credential and get a higher level of confidence that a user is who he says he is (69% and 65% respectively). But business users cited capturing attributes about users as the biggest benefit (95%). This indicates an evolving view of identity. No longer viewed as simply a component for protecting data, identity is now seen as a value asset that can provide data which could drive incremental revenue and help maintain customers.

Enhancing BYOID

Additional security developments could drive increased BYOID adoption. The majority of IT and business users said ‘identity validation processes’ would help increase BYOID adoption (72% and 70% respectively). Implementing fraud risk engines also rated among the top three across both groups. Interestingly only 27% of business respondents believed formal accreditation of the identity provider was very important / essential, while 59% of IT users believe formal accreditation is very important / essential.

Perception of identity providers

Respondents’ preferred identity provider varied based on the situation and region. When asked what social ID was of most interest to their organisation, IT users ranked PayPal as the preferred identity provider across all regions. Business user responses varied with Amazon edging out PayPal and Microsoft. When asked what social ID respondents preferred as a consumer, Google was highest ranked among both IT users and business users.

“An holistic examination of the attitudes uncovered in the research show two clear views of identity,” said Dr. Larry Ponemon, chairman and founder, Ponemon Institute. “IT continues to take a traditional risk-based, security view of dealing with identities, while the business side takes a more value-based, customer-centric view of identity. In order to gain the most value from any BYOID initiative, these two groups must collaborate and become allies for secure business growth.”

“Enabling and protecting the open enterprise is the mantra of today’s application economy. Identity is the new security perimeter that makes this possible. CA is dedicated to providing the market with the solutions needed to accelerate the delivery of secure, new applications, and help ensure access to the right users on their devices. This ultimately translates into driving business growth, which is good news for the SA economy,” concludes Naidoo.

A BYOID infographic is available at www.securitysa.com/*infographic1 (short URl to http://www.ca.com/us/~/media/Files/infographics/a-three-legged-race-are-businesses-and-it-getting-off-on-the-wrong-foot-with-byoid.PDF).

The report can be downloaded at www.security sa.com/*CA1 (short URl to https://www.ca.com/us/register/forms/collateral/ponemon-institute-research-report.aspx).

For more information contact CA Southern Africa, +27 (0)11 417 8645, [email protected], www.caafrica.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
News & Events Access Control & Identity Management Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Advanced time & attendance solutions
Technews Publishing Access Control & Identity Management Products & Solutions
From biometric devices to a powerful mobile app, you will see how businesses of all sizes save time, cut costs, and improve productivity with BioSyn.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Reliability, innovation and flexibility
Entry Pro Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Through constant innovation and advancement in technology and systems, Entry Pro strives to provide its clients with not only the most suitable, but also the most advanced solution.

Read more...
Smarter security with automated visitor management
LD Africa Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Automated visitor management solutions, like LD Access, are transforming this process by reducing human workload, while enhancing security and efficiency.

Read more...
Paxton enhances installer loyalty programme
Paxton Access Control & Identity Management News & Events
Paxton has made it easier for security installers to benefit from its popular loyalty programme, Paxton Rewards, with points now added automatically when purchasing through approved distribution partners.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.