In Search of a Context-Aware Security Strategy

Context-aware security

1 - In Search of a Context-Aware Security StrategyIn Search of a Context-Aware Security Strategy

Seeking to strike a balance between security and end-user productivity, many firms are looking for some form of context-aware security, which prioritizes threats.

2 - IT Security PrioritiesIT Security Priorities

IT pros (87%) and business execs (86%) agree that IT security is a much higher priority than end-user convenience.

3 - IT Security's Impact on ProductivityIT Security’s Impact on Productivity

91% of business users report IT security has an impact on their productivity, while 53% say that impact has been greater in the last 18 months.

4 - The Password ParadoxThe Password Paradox

A vast majority of business users (85%) report they have to keep track of multiple passwords and 29% report having to keep track of six or more.

5 - Mobile Device UseMobile Device Use

46% of business users own their own mobile devices, and 51% report they manage their devices on their own. Only 53% of the companies that own the devices actually manage them.

6 - Access to Corporate DataAccess to Corporate Data

95% use their mobile devices to access corporate data, and 83% report they do so daily.

7 - Remote Access SecurityRemote Access Security

58% say they use their mobile devices to access corporate data remotely, with 82% of those respondents saying their companies have adopted some form of remote access security. A full 92% say they have been negatively impacted by remote access security technologies.

8 - Cloud Application Security IssuesCloud Application Security Issues

While 77% of IT respondents say cloud applications increase productivity, 74% say security issues prevent wider adoption of those applications.

9 - BYOD Security IssuesBYOD Security Issues

61% of the IT pros polled indicate that BYOD policies increase productivity, but 72% also say security prevents further adoption.

10 - Top IT Security RisksTop IT Security Risks

Employee workarounds to IT security (69%), BYOD practices (64%), and remote access and compromised credentials (both at 63%) top the list of risks.

11 - Context-Aware SecurityContext-Aware Security

Just over a quarter (28%) report they have implemented context-aware security, while 48% say they have in some areas but not all.

12 - Benefits of Context-Aware SecurityBenefits of Context-Aware Security

The ability to prioritize threats (55%), followed by greater visibility and the capability to identify threats in real time, both at 47%, are the top benefits.

13 - Top IT Security ChallengesTop IT Security Challenges

Difficulty addressing changing security needs (53%), followed by manual IT intervention (47%) and employee productivity (36%) are the top security issues.

Michael Vizard
Michael Vizard
Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight, Channel Insider and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.


Must Read