Bring your own identity

September 2014 Access Control & Identity Management

New research shows that both the lines of business and IT departments see value in ‘Bring Your Own Identity’ (BYOID) initiatives, where social networking or digital IDs are used for application login. The groups also agree that more security is needed to increase BYOID adoption.

The report, ‘The Identity Imperative for the Open Enterprise 2014’, conducted by the Ponemon Institute and CA Technologies, examines business user and IT department attitudes toward BYOID.

Ugan Naidoo, head of security at CA Southern Africa.
Ugan Naidoo, head of security at CA Southern Africa.

“In today’s application-driven economy, access to applications has to be simple and secure. BYOID is an increasingly popular option for simplifying access. It can reduce the need to create new accounts for every site, which leads to registration fatigue and abandoned shopping carts,” says Ugan Naidoo, head of security at CA Southern Africa. “We are working to make sure we enhance BYOID security without adding friction or complexity.”

The report provided several key insights into BYOID, including the current state of adoption, its perceived value and views toward the identity providers and how BYOID could be enhanced.

Current state

BYOID deployment using social IDs is still in its infancy, but interest is high, especially for mobile and Web customer populations. There is a high level of interest in BYOID and using social identities such as Facebook, LinkedIn or Yahoo, with 50% of IT and 63% of business users expressing high or very high interest. Customers engaging with the business via the Web and mobile device were highest rated for targeted digital identity engagement, eclipsing other populations such as job recruits, employees, contractors and retirees.

Perceived value

Identity is now viewed as a contributing growth asset as well as a security component. Both IT and business users agreed that an important reason for BYOID adoption in their organisation was to achieve a stronger identity credential and get a higher level of confidence that a user is who he says he is (69% and 65% respectively). But business users cited capturing attributes about users as the biggest benefit (95%). This indicates an evolving view of identity. No longer viewed as simply a component for protecting data, identity is now seen as a value asset that can provide data which could drive incremental revenue and help maintain customers.

Enhancing BYOID

Additional security developments could drive increased BYOID adoption. The majority of IT and business users said ‘identity validation processes’ would help increase BYOID adoption (72% and 70% respectively). Implementing fraud risk engines also rated among the top three across both groups. Interestingly only 27% of business respondents believed formal accreditation of the identity provider was very important / essential, while 59% of IT users believe formal accreditation is very important / essential.

Perception of identity providers

Respondents’ preferred identity provider varied based on the situation and region. When asked what social ID was of most interest to their organisation, IT users ranked PayPal as the preferred identity provider across all regions. Business user responses varied with Amazon edging out PayPal and Microsoft. When asked what social ID respondents preferred as a consumer, Google was highest ranked among both IT users and business users.

“An holistic examination of the attitudes uncovered in the research show two clear views of identity,” said Dr. Larry Ponemon, chairman and founder, Ponemon Institute. “IT continues to take a traditional risk-based, security view of dealing with identities, while the business side takes a more value-based, customer-centric view of identity. In order to gain the most value from any BYOID initiative, these two groups must collaborate and become allies for secure business growth.”

“Enabling and protecting the open enterprise is the mantra of today’s application economy. Identity is the new security perimeter that makes this possible. CA is dedicated to providing the market with the solutions needed to accelerate the delivery of secure, new applications, and help ensure access to the right users on their devices. This ultimately translates into driving business growth, which is good news for the SA economy,” concludes Naidoo.

A BYOID infographic is available at www.securitysa.com/*infographic1 (short URl to http://www.ca.com/us/~/media/Files/infographics/a-three-legged-race-are-businesses-and-it-getting-off-on-the-wrong-foot-with-byoid.PDF).

The report can be downloaded at www.security sa.com/*CA1 (short URl to https://www.ca.com/us/register/forms/collateral/ponemon-institute-research-report.aspx).

For more information contact CA Southern Africa, +27 (0)11 417 8645, [email protected], www.caafrica.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...