Unmanaged Wearables Infiltrating the Enterprise, According to Centrify RSA Survey
Identity management for wearables should be a top priority for IT managers
March 02, 2016
RSA Conference ― San Francisco — Centrify, the leader in securing enterprise identities against cyberthreats, today announced results from an onsite survey conducted at the RSA Conference regarding the prevalence of wearables in the enterprise and the growing concern they pose for IT security. RSA is taking place this week at the Moscone Center.
First and foremost, 69 percent of wearable device owners say they forego login credentials, such as PINs, passwords, fingerprint scanners and voice recognition, to access their devices. 56 percent of wearable owners use their devices to access business apps such as Box, Slack, Trello, Dropbox, Salesforce, Google Docs, Microsoft Office or a combination of those.
Perhaps most alarming, despite the lack of login credentials and ready access to corporate data, 42 percent of wearable owners cite identity theft as their top security concern when it comes to their devices. Lack of IT management and device control comes in second (34 percent) and a general increase in breaches of sensitive work data or information comes in third (22 percent).
“As wearables become more common in the enterprise, IT departments must take serious steps to protect them as carefully as they do laptops and smartphones,” said Bill Mann, Chief Product Officer for Centrify. “Wearables are deceptively private. Owners may feel that due to their ongoing proximity to the body, they’re less likely to fall into the wrong hands. However, hackers don’t need to take physical possession of a device in order to exploit a hole in security. The best news is that solutions already exist that can easily wrap wearables into the identity management picture.”
For this survey, Centrify polled more than 100 randomly-chosen RSA attendees. For more information, please visit Centrify at RSA South Hall Booth #S2027 or at www.centrify.com.
Centrify is the leader in securing enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring. Centrify is trusted by over 5000 customers, including more than half of the Fortune 50.
Centrify is a registered trademark and Centrify Server Suite, Centrify Privilege Service and Centrify Identity Service are trademarks of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.